Abstract
In public places, information can be accessed by its unauthorized users, while we are sometimes forced to access our unwanted information unexpectedly. We have introduced the concept of Secure Spaces, physical environments where any information is always protected from its unauthorized users, and have proposed a content-based entry control model and an architecture for Secure Spaces which protect their contents’ freedom of information delivery but do not protect their visitors’ freedom of information access. This paper aims at building truly Secure Spaces which protect both freedoms and enhances our proposed model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hattori, S., Tezuka, T., Tanaka, K.: Content-Based Entry Control for Secure Spaces. In: Proc. of the International Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT’06) in conjunction with MDM’06, vol. 98 (2006)
Hattori, S., Tezuka, T., Tanaka, K.: Secure Spaces: Physically Protected Environments for Information Security. In: Proc. of the Joint 3rd International Conference on Soft Computing and Intelligent Systems and 7th International Symposium on advanced Intelligent Systems (SCIS&ISIS’06), pp. 687–691 (2006)
Rosenthal, L., Stanford, V.M.: NIST Smart Space: Pervasive Computing Initiative. In: Proc. of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’00), pp. 6–11 (2000)
Coen, M.H.: Design Principles for Intelligent Environments. In: Proc. of the 15th National/10th Conference on Artificial Intelligence/Innovative Applications of Artificial Intelligence (AAAI/IAAI’98), pp. 547–554 (1998)
Roman, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: Gaia: A Middleware Infrastructure to Enable Active Spaces. IEEE Pervasive Computing 1(4), 74–83 (2002)
Johanson, B., Fox, A., Winograd, T.: The Interactive Workspaces Project: Experiences With Ubiquitous Computing Rooms. IEEE Pervasive Computing 1(2), 67–74 (2002)
Kidd, C.D., Orr, R., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E., Starner, T.E., Newstetter, W.: The Aware Home: A Living Laboratory for Ubiquitous Computing Research. In: Proc. of the 2nd International Workshop on Cooperative Buildings (CoBuild’99). LNCS, vol. 1670, pp. 191–198. Springer, Heidelberg (1999)
Brumitt, B., Meyers, B., Krumm, J., Kern, A., Shafer, S.: EasyLiving: Technologies for Intelligent Environments. In: Proc. of the 2nd International Symposium on Handheld and Ubiquitous Computing (HUC’00). LNCS, vol. 1927, pp. 12–29. Springer, Heidelberg (2000)
Pentland, A.: Smart Clothes, Smart Rooms. In: Proc. of WETICE’01, vol. 3 (2001)
Brooks, R.A.: The Intelligent Room Project. In: Proc. of the 2nd International Conference on Cognitive Technology (CT’97), pp. 271–278 (1997)
Xie, W., Shi, Y., Xu, G., Xie, D.: Smart Classroom - An Intelligent Environment for Tele-education. In: Proc. of the 2nd IEEE Pacific-Rim Conference on Multimedia (PCM’01). LNCS, vol. 2195, pp. 662–668. Springer, Heidelberg (2001)
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: Proc. of the First IEEE International Conference on Pervasive Computing and Communications (PerCom’03), pp. 489–496 (2003)
Kottahachchi, B., Laddaga, R.: Access Controls for Intelligent Environments. In: Proc. of the 4th Annual International Conference on Intelligent Systems Design and Applications (ISDA’04) (2004)
Sampemane, G., Naldurg, P., Campbell, R.H.: Access Control for Active Spaces. In: Proc. of the 18th Annual Computer Security Applications Conference (ACSAC’02), pp. 343–352 (2002)
Song, Y.J., Tobagus, W., Leong, D.Y., Johanson, B., Fox, A.: iSecurity: A Security Framework for Interactive Workspaces. Tech Report, Stanford University (2004)
Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing Context-Aware Applications Using Environment Roles. In: Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT’01), pp. 10–20 (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Hattori, S., Tanaka, K. (2007). Secure Spaces: Protecting Freedom of Information Access in Public Places. In: Okadome, T., Yamazaki, T., Makhtari, M. (eds) Pervasive Computing for Quality of Life Enhancement. ICOST 2007. Lecture Notes in Computer Science, vol 4541. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73035-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-73035-4_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73034-7
Online ISBN: 978-3-540-73035-4
eBook Packages: Computer ScienceComputer Science (R0)