The evolution of mobile technologies enables us to realize ubiquitous computing environments. In such environments, a user's mobile terminal manages the sensitive information and assists in various activities based on the user's information. At the same time, information leakage will become a serious social problem. In this paper, we propose a framework to protect the sensitive information of users in a manner they consider safe. In the framework, the user provides a trusted program that implements the manner he/she considers safe. The information recipient accesses user's sensitive information through this trusted program. In this manner, the user can protect his/her sensitive information. However, there exist several challenges in the realization of this framework. In this paper, we propose a method for generating a trusted program and discuss the solutions to other challenges.
|Number of pages||12|
|Journal||International Journal of Security and its Applications|
|Publication status||Published - Dec 1 2007|
All Science Journal Classification (ASJC) codes
- Computer Science(all)