Access Control for Security and Privacy in Ubiquitous Computing Environments(<Special Section>Ubiquitous Networks)
スポンサーリンク
概要
- 論文の詳細を見る
Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.
- 社団法人電子情報通信学会の論文
- 2005-03-01
著者
-
Yamada Shigeki
National Institute of Informatics
-
KAMIOKA Eiji
National Institute of Informatics
-
Yamada Shigeki
National Inst. Informatics(nii) Tokyo
-
Yamada Shigeki
National Inst. Informatics (nii) Tokyo Jpn
-
Kamioka Eiji
National Inst. Informatics Tokyo Jpn
関連論文
- BS-4-16 Distributing Akaroa2 on PlanetLab(BS-4. System, control and design technologies for emerging network)
- Toward an Efficient Mobile Phone Based Traffic Estimation System
- Pricing to Stimulate Node Cooperation in Wireless Ad Hoc Networks(Network)
- Design, Analysis, and Evaluation of Mobile Agent based Privacy Protection Scheme for Multi-party Computation Problems(Selected Papers from ICMU 2006(Third International Conference on Mobile Computing and Ubiquitous Networking))
- An Efficient and Privacy-Aware Meeting Scheduling Scheme Using Common Computational Space(Distributed Cooperation and Agents)
- CoMoRoHo: Cooperative Mobile Router-Based Handover Scheme for Long-Vehicular Multihomed Networks(Mobile Multimedia Communications)
- BS-15-23 Solving Multi-party Collaborative Problems with Privacy Protection(BS-15.Network Planning, Control, and Management,ENGLISH SESSION)
- BS-15-20 Schemes for Network Mobility Management(BS-15.Network Planning, Control, and Management,ENGLISH SESSION)
- Pricing to Improve Cooperation in Wireless Ad Hoc Networks
- Privacy Protection with Customized Java Sandbox Architecture
- Pricing to Improve Cooperation in Wireless Ad Hoc Networks
- Privacy Protection with Customized Java Sandbox Architecture
- BS-8-15 iCOP Model for Personal Privacy Protection(BS-8. Technology and Architecture for Ubiquitous Network Systems,ENGLISH SESSION)
- BS-8-7 Local Route Optimization for Network Mobility (NEMO) Support(BS-8. Technology and Architecture for Ubiquitous Network Systems,ENGLISH SESSION)
- MoRaRo : Mobile Router-Assisted Route Optimization for Network Mobility (NEMO) Support(Mobile Technologies, New Technologies and their Applications of the Internet III)
- Architectural Design of Next-Generation Science Information Network(Advanced Transfer Technologies for the Next Generation Network)
- BS-7-14 On the Risk Measurement for Shared Personal Data(BS-7. Network Planning, Control and Management)
- BS-10-18 On Secondary Uses of Personal Health Records
- BS-4-23 Privacy Issues Related to Smart Health Card Systems(BS-4. System, control and design technologies for emerging network)
- A handover scheme for long-vehicular-multihomed mobile networks (モバイルNWとインターネット/家電NWはどう融合するか?--標準化(DLNA等),モバイルNW,家電NW,情報家電,及び一般)
- BS-10-18 Modelling Incentive for Cooperation in Wireless Ad Hoc Networks(BS-10. Network Planning, Control, and Management)
- BS-10-17 A Framework of Graceful Vertical Handover(BS-10. Network Planning, Control, and Management)
- Maximizing User Satisfaction Based on Mobility in Heterogeneous Mobile Multimedia Communication Networks(Mobile Multimedia Communications)
- Efficient Packet forwarding Strategies via Pricing in Wireless Ad Hoc Networks (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Evaluation of User-centric Performances to Select an Optimal Access Network in Heterogeneous Systems
- Evaluation of User-centric Performances to Select an Optimal Access Network in Heterogeneous Systems
- Securing Data in Mobile Computing Environment
- Performance Evaluation of Network Mobility (NEMO) Basic Support Protocol and Route Optimization
- Securing Data in Mobile Computing Environment
- Performance Evaluation of Network Mobility (NEMO) Basic Support Protocol and Route Optimization
- Proposal for Context-Aware Information Delivery and Personal Communication Network Architectures with Preliminary Evaluations of Their Performance(Network)
- Effect of Mobility on User Satisfaction in Heterogeneous Wireless Networks
- A Game Theorem-Based Approach to Avoid Malicious Nodes in Mobile Ad hoc Networks
- A Proposal of Context-Aware Information Delivery System in Mobile Environments
- BS-12-38 Effect of Retransmission Timers in Custody-enabled Delay and Disruption-Tolerant Networks(BS-12. Network Planning, Control, and Management)
- BS-10-24 Privacy loss in Multi-agent Negotiation(BS-10. Network Planning, Control, and Management)
- Ubiquitous Computing; Networks and Applications(The IEICE Transactions (publishedin Japanese) Vol. J 86-B, No.6(Communications))
- Access Control for Security and Privacy in Ubiquitous Computing Environments(Ubiquitous Networks)
- BS-4-26 Managing Intermittent Connectivity(IC) in Delay Tolerant Network(DTN)(BS-4. System, control and design technologies for emerging network)
- Sequence Set with Three Zero Correlation Zones and Its Application in MC-CDMA System(Sequence Design and its Application in Communications)
- General Method to Construct LS Codes by Complete Complementary Sequences(Wireless Communication Technologies)
- BS-12-7 DTN: A preferred networking technology for Sparsely-connected Mobile Ad Hoc network(BS-12. Network Planning, Control, and Management)
- A sender/receiver-coupled Fuzzy Logic System for transmission power control in Wireless Sensor Networks (インターネットアーキテクチャ)
- BS-6-46 Providing Basic Communication Services in a Disaster Stricken Region(BS-6. Planning, Control and Management on Networks and Services)
- BS-6-23 A Clean Slate-based Thin Layer Approach in Delay and Disruption Tolerant Networks(BS-6. Planning, Control and Management on Networks and Services)
- BS-10-34 A Probabilistic Location-based Routing Scheme for Delay-Tolerant Networks
- BS-3-7 Coping with congestion in opportunistic networks using weighted queuing(BS-3. Management and Control Technologies for Innovative Networks)
- BS-3-42 Comparison of Inter-region Routing Protocols in Delay-Tolerant Networks(BS-3. Management and Control Technologies for Innovative Networks)
- Managing Disconnected Mobile Nodes in a Delay Tolerant Network with HALF Routing Protocol
- BS-5-12 Sticky Transfers for Opportunistic Networks(BS-5. Network and Service Design, Control and Management)
- BS-1-32 On the Software Defined WAN Propagation Latency
- BS-1-10 Utilizing social phenomena and movement pattern in DTN
- An Evaluation of Link Aggregation on OpenFlow Platforms
- GICS : Group-based Internet Connection Spreading Architecture for Disaster Recovery