Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation
スポンサーリンク
概要
- 論文の詳細を見る
Using Web-based content management systems such as Blog, an end user can easily publish User Generated Content (UGC). Although publishing of UGCs is easy, controlling access to them is a difficult problem for end users. Currently, most of Blog sites offer no access control mechanism, and even when it is available to users, it is not sufficient to control users who do not have an account at the site, not to mention that it cannot control accesses to content hosted by other UGC sites. In this paper, we propose new access control architecture for UGC, in which third party entities can offer access control mechanism to users independently of UGC hosting sites. With this architecture, a user can control accesses to his content that might be spread over many different UGC sites, regardless of whether those sites have access control mechanism or not. The key idea to separate access control mechanism from UGC sites is to apply cryptographic access control and we implemented the idea in such a way that it requires no modification to UGC sites and Web browsers. Our prototype implementation shows that the proposed access control architecture can be easily deployed in the current Web-based communication environment and it works quite well with popular Blog sites.
- (社)電子情報通信学会の論文
- 2009-10-01
著者
-
Miyake Yutaka
Kddi R&d Laboratories Inc.
-
Hashimoto Kazuo
Graduate School Of Information Sciences Tohoku University
-
YAMADA AKIRA
KDDI R & D Laboratories Inc.
-
KUBOTA Ayumu
KDDI R & D Labs. Inc.
-
Miyake Yutaka
Kddi R & D Labs. Inc.
-
Kubota Ayumu
Kddi R&d Laboratories Inc.
-
Yamada Akira
Kddi R&d Laboratories Inc.
関連論文
- Proposal and Performance Evaluation of Hash-based Authentication for P2P Network
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- Conceptual design of recommender system for physical activity (ヒューマン情報処理)
- Boosting as a method of novelty detection (ヒューマン情報処理)
- ELB in IP/NGEO Satellite Constellations : Issues and Solutions(Advanced Technology-I)
- (Network Services Basics) Notification of Certificate Revocation Status between Different Domains under a PKI System ( Object-Oriented Technologies)
- A-7-9 Key Management for Privacy Protection in Sensor Information Network using Threshold Cryptography
- A-7-18 Proposal of Privacy Protection Mechanism for Sensor Information Network
- Implementation and Evaluation of a Micropayment System for Mobile Environments (Security and Society)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients (Applications) (Cryptography and Information Security)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
- TCP Gateway for Satellite-based Internet Service Considering Accommodation of Multiple Customers (特集 次世代移動通信ネットワークとその応用)
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists
- Secure Host Name Resolution Infrastructure for Overlay Networks(Networking Technologies for Overlay Networks)
- Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation
- Software Protection Combined with Tamper-Proof Device
- Proposal and Performance Evaluation of Hash-based Authentication for P2P Network
- Fast Implementation of KCipher-2 for Software and Hardware
- Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
- FOREWORD
- Securing distributed storage systems based on arbitrary regenerating codes
- BS-7-44 Decodability Attacks in XOR Network Coding
- BS-7-41 A Consideration of Detecting Compromised Web Sites by Analyzing Web Link Structures