EUC 2005: Embedded and Ubiquitous Computing – EUC 2005 Workshops pp 433-442 | Cite as
A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability
Abstract
Thanks to the spread of mobile technologies, we will be able to realize the ubiquitous computing environment, in which equipment connected to the Internet assists users in their activities without special care on their part. Then, a function to protect private information is needed. This paper proposes a model for protecting private information. The basic idea of our model is to make use of private information through a program which a user trusts. A user offers a trusted program to a partner and compels a partner to make use of his private information through this program. In this way, a user prevents illegal use of his private information.
Keywords
Service Provider Management Program Private Information Privacy Policy User AgentReferences
- 1.Aucsmith, D., Fraunke, G.: Tamper Resistant Software: An Implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996)CrossRefGoogle Scholar
- 2.Iwao, T., Wada, Y., Okada, M., Amamiya, M.: A framework for the exchange and installation of protocols in a multi-agent system. In: Klusch, M., Zambonelli, F. (eds.) CIA 2001. LNCS (LNAI), vol. 2182, pp. 211–222. Springer, Heidelberg (2001)CrossRefGoogle Scholar
- 3.Pearce, C., Bertok, P., Schyndel, R.V.: Protecting Consumer Data in Composite Web Services. In: Proc. of 20th IFIP International Information Security Conference, pp. 19–34 (2005)Google Scholar
- 4.P3P project, http://www.w3.org/P3P
- 5.Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)CrossRefGoogle Scholar
- 6.Takahashi, K., Amamiya, S., Amamiya, M.: A model for flexible service use and secure resource management. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 1143–1153. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 7.
- 8.Zhong, G., Amamiya, S., Takahashi, K., Mine, T., Amamiya, M.: The Design and Implementation of KODAMA System. IEICE Transactions INF.& SYST. E85-D(4), 637–646 (2002)Google Scholar