An approach of trusted program generation for user-responsible privacy

Ken'ichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Presently, one can use services on the Internet. These services require user's sensitive information such as name, address, credit card number, etc. However, various privacy problems such as information leakage cases are becoming serious social concern. Therefore, we propose a framework to protect user's sensitive information. It allows a user to specify the usage of his/her sensitive information and restricts the use of information by an information recipient. The main concept of the framework is that an information recipient can use sensitive information only in the manner considered safe by the information owner. This is realized by a trusted program that implements the manner of information usage trusted by the information owner. The user offers his/her trusted program to an information recipient and requires to make use of the user's sensitive information through the trusted program. In this paper, we propose the approach for trusted program generation.

Original languageEnglish
Title of host publicationUbiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings
Pages1159-1170
Number of pages12
Publication statusPublished - Dec 1 2007
Event4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007 - Hong Kong, Hong Kong
Duration: Jul 11 2007Jul 13 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4611 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007
CountryHong Kong
CityHong Kong
Period7/11/077/13/07

Fingerprint

Privacy
Internet
Leakage

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Takahashi, K., Liu, Z., Sakurai, K., & Amamiya, M. (2007). An approach of trusted program generation for user-responsible privacy. In Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings (pp. 1159-1170). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4611 LNCS).

An approach of trusted program generation for user-responsible privacy. / Takahashi, Ken'ichi; Liu, Zhaoyu; Sakurai, Kouichi; Amamiya, Makoto.

Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. 2007. p. 1159-1170 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4611 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Takahashi, K, Liu, Z, Sakurai, K & Amamiya, M 2007, An approach of trusted program generation for user-responsible privacy. in Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4611 LNCS, pp. 1159-1170, 4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007, Hong Kong, Hong Kong, 7/11/07.
Takahashi K, Liu Z, Sakurai K, Amamiya M. An approach of trusted program generation for user-responsible privacy. In Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. 2007. p. 1159-1170. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Takahashi, Ken'ichi ; Liu, Zhaoyu ; Sakurai, Kouichi ; Amamiya, Makoto. / An approach of trusted program generation for user-responsible privacy. Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. 2007. pp. 1159-1170 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{638ae06e449c490486548b5c21f1a4ea,
title = "An approach of trusted program generation for user-responsible privacy",
abstract = "Presently, one can use services on the Internet. These services require user's sensitive information such as name, address, credit card number, etc. However, various privacy problems such as information leakage cases are becoming serious social concern. Therefore, we propose a framework to protect user's sensitive information. It allows a user to specify the usage of his/her sensitive information and restricts the use of information by an information recipient. The main concept of the framework is that an information recipient can use sensitive information only in the manner considered safe by the information owner. This is realized by a trusted program that implements the manner of information usage trusted by the information owner. The user offers his/her trusted program to an information recipient and requires to make use of the user's sensitive information through the trusted program. In this paper, we propose the approach for trusted program generation.",
author = "Ken'ichi Takahashi and Zhaoyu Liu and Kouichi Sakurai and Makoto Amamiya",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "9783540735489",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "1159--1170",
booktitle = "Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings",

}

TY - GEN

T1 - An approach of trusted program generation for user-responsible privacy

AU - Takahashi, Ken'ichi

AU - Liu, Zhaoyu

AU - Sakurai, Kouichi

AU - Amamiya, Makoto

PY - 2007/12/1

Y1 - 2007/12/1

N2 - Presently, one can use services on the Internet. These services require user's sensitive information such as name, address, credit card number, etc. However, various privacy problems such as information leakage cases are becoming serious social concern. Therefore, we propose a framework to protect user's sensitive information. It allows a user to specify the usage of his/her sensitive information and restricts the use of information by an information recipient. The main concept of the framework is that an information recipient can use sensitive information only in the manner considered safe by the information owner. This is realized by a trusted program that implements the manner of information usage trusted by the information owner. The user offers his/her trusted program to an information recipient and requires to make use of the user's sensitive information through the trusted program. In this paper, we propose the approach for trusted program generation.

AB - Presently, one can use services on the Internet. These services require user's sensitive information such as name, address, credit card number, etc. However, various privacy problems such as information leakage cases are becoming serious social concern. Therefore, we propose a framework to protect user's sensitive information. It allows a user to specify the usage of his/her sensitive information and restricts the use of information by an information recipient. The main concept of the framework is that an information recipient can use sensitive information only in the manner considered safe by the information owner. This is realized by a trusted program that implements the manner of information usage trusted by the information owner. The user offers his/her trusted program to an information recipient and requires to make use of the user's sensitive information through the trusted program. In this paper, we propose the approach for trusted program generation.

UR - http://www.scopus.com/inward/record.url?scp=38049090576&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38049090576&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:38049090576

SN - 9783540735489

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 1159

EP - 1170

BT - Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings

ER -