TY - GEN
T1 - An approach of trusted program generation for user-responsible privacy
AU - Takahashi, Ken'ichi
AU - Liu, Zhaoyu
AU - Sakurai, Kouichi
AU - Amamiya, Makoto
PY - 2007
Y1 - 2007
N2 - Presently, one can use services on the Internet. These services require user's sensitive information such as name, address, credit card number, etc. However, various privacy problems such as information leakage cases are becoming serious social concern. Therefore, we propose a framework to protect user's sensitive information. It allows a user to specify the usage of his/her sensitive information and restricts the use of information by an information recipient. The main concept of the framework is that an information recipient can use sensitive information only in the manner considered safe by the information owner. This is realized by a trusted program that implements the manner of information usage trusted by the information owner. The user offers his/her trusted program to an information recipient and requires to make use of the user's sensitive information through the trusted program. In this paper, we propose the approach for trusted program generation.
AB - Presently, one can use services on the Internet. These services require user's sensitive information such as name, address, credit card number, etc. However, various privacy problems such as information leakage cases are becoming serious social concern. Therefore, we propose a framework to protect user's sensitive information. It allows a user to specify the usage of his/her sensitive information and restricts the use of information by an information recipient. The main concept of the framework is that an information recipient can use sensitive information only in the manner considered safe by the information owner. This is realized by a trusted program that implements the manner of information usage trusted by the information owner. The user offers his/her trusted program to an information recipient and requires to make use of the user's sensitive information through the trusted program. In this paper, we propose the approach for trusted program generation.
UR - http://www.scopus.com/inward/record.url?scp=38049090576&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38049090576&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-73549-6_113
DO - 10.1007/978-3-540-73549-6_113
M3 - Conference contribution
AN - SCOPUS:38049090576
SN - 9783540735489
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1159
EP - 1170
BT - Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings
PB - Springer Verlag
T2 - 4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007
Y2 - 11 July 2007 through 13 July 2007
ER -