TY - GEN
T1 - An approach of program analysis prevention for information protection
AU - Takahashi, Ken'ichi
AU - Liu, Zhaoyu
AU - Sakurai, Kouichi
PY - 2007/12/31
Y1 - 2007/12/31
N2 - The evolution of mobile technologies will enable us to realize the ubiquitous computing environment. In such environment, a user's mobile terminal manages his sensitive information and assists in his activities. At the same time, information leakage will become more serious social problems. In this paper, we propose a framework which protects user's sensitive information according to a way the user supposes safe. In the framework, a user offers a program, which implements a way the user supposes safe, to an information recipient. And then, the information recipient makes use of the user's sensitive information through the program. In this manner, the user can protect his sensitive information. The framework, however, has a problem, by which the information recipient may analyze the program and obtain some sensitive information. In this paper, we introduce a tamper-proof device and trust relationship for a solution of this problem.
AB - The evolution of mobile technologies will enable us to realize the ubiquitous computing environment. In such environment, a user's mobile terminal manages his sensitive information and assists in his activities. At the same time, information leakage will become more serious social problems. In this paper, we propose a framework which protects user's sensitive information according to a way the user supposes safe. In the framework, a user offers a program, which implements a way the user supposes safe, to an information recipient. And then, the information recipient makes use of the user's sensitive information through the program. In this manner, the user can protect his sensitive information. The framework, however, has a problem, by which the information recipient may analyze the program and obtain some sensitive information. In this paper, we introduce a tamper-proof device and trust relationship for a solution of this problem.
UR - http://www.scopus.com/inward/record.url?scp=37349071348&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=37349071348&partnerID=8YFLogxK
U2 - 10.1109/MUE.2007.64
DO - 10.1109/MUE.2007.64
M3 - Conference contribution
AN - SCOPUS:37349071348
SN - 0769527779
SN - 9780769527772
T3 - Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
SP - 35
EP - 40
BT - Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
T2 - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
Y2 - 26 April 2007 through 28 April 2007
ER -