A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability

  • Ken’ichi Takahashi
  • Kouichi Sakurai
  • Makoto Amamiya
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3823)

Abstract

Thanks to the spread of mobile technologies, we will be able to realize the ubiquitous computing environment, in which equipment connected to the Internet assists users in their activities without special care on their part. Then, a function to protect private information is needed. This paper proposes a model for protecting private information. The basic idea of our model is to make use of private information through a program which a user trusts. A user offers a trusted program to a partner and compels a partner to make use of his private information through this program. In this way, a user prevents illegal use of his private information.

Keywords

Service Provider Management Program Private Information Privacy Policy User Agent 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Aucsmith, D., Fraunke, G.: Tamper Resistant Software: An Implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  2. 2.
    Iwao, T., Wada, Y., Okada, M., Amamiya, M.: A framework for the exchange and installation of protocols in a multi-agent system. In: Klusch, M., Zambonelli, F. (eds.) CIA 2001. LNCS (LNAI), vol. 2182, pp. 211–222. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Pearce, C., Bertok, P., Schyndel, R.V.: Protecting Consumer Data in Composite Web Services. In: Proc. of 20th IFIP International Information Security Conference, pp. 19–34 (2005)Google Scholar
  4. 4.
    P3P project, http://www.w3.org/P3P
  5. 5.
    Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  6. 6.
    Takahashi, K., Amamiya, S., Amamiya, M.: A model for flexible service use and secure resource management. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 1143–1153. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
  8. 8.
    Zhong, G., Amamiya, S., Takahashi, K., Mine, T., Amamiya, M.: The Design and Implementation of KODAMA System. IEICE Transactions INF.& SYST. E85-D(4), 637–646 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Ken’ichi Takahashi
    • 1
  • Kouichi Sakurai
    • 1
    • 2
  • Makoto Amamiya
    • 2
  1. 1.Institute of Systems & Information Technologies/KYUSHUFukuokaJapan
  2. 2.Faculty of Information Science and Electrical EngineeringKyushu UniversityFukuokaJapan

Personalised recommendations