Skip to main content

Secure Spaces: Protecting Freedom of Information Access in Public Places

  • Conference paper
Pervasive Computing for Quality of Life Enhancement (ICOST 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4541))

Included in the following conference series:

Abstract

In public places, information can be accessed by its unauthorized users, while we are sometimes forced to access our unwanted information unexpectedly. We have introduced the concept of Secure Spaces, physical environments where any information is always protected from its unauthorized users, and have proposed a content-based entry control model and an architecture for Secure Spaces which protect their contents’ freedom of information delivery but do not protect their visitors’ freedom of information access. This paper aims at building truly Secure Spaces which protect both freedoms and enhances our proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hattori, S., Tezuka, T., Tanaka, K.: Content-Based Entry Control for Secure Spaces. In: Proc. of the International Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT’06) in conjunction with MDM’06, vol. 98 (2006)

    Google Scholar 

  2. Hattori, S., Tezuka, T., Tanaka, K.: Secure Spaces: Physically Protected Environments for Information Security. In: Proc. of the Joint 3rd International Conference on Soft Computing and Intelligent Systems and 7th International Symposium on advanced Intelligent Systems (SCIS&ISIS’06), pp. 687–691 (2006)

    Google Scholar 

  3. Rosenthal, L., Stanford, V.M.: NIST Smart Space: Pervasive Computing Initiative. In: Proc. of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’00), pp. 6–11 (2000)

    Google Scholar 

  4. Coen, M.H.: Design Principles for Intelligent Environments. In: Proc. of the 15th National/10th Conference on Artificial Intelligence/Innovative Applications of Artificial Intelligence (AAAI/IAAI’98), pp. 547–554 (1998)

    Google Scholar 

  5. Roman, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: Gaia: A Middleware Infrastructure to Enable Active Spaces. IEEE Pervasive Computing 1(4), 74–83 (2002)

    Article  Google Scholar 

  6. Johanson, B., Fox, A., Winograd, T.: The Interactive Workspaces Project: Experiences With Ubiquitous Computing Rooms. IEEE Pervasive Computing 1(2), 67–74 (2002)

    Article  Google Scholar 

  7. Kidd, C.D., Orr, R., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E., Starner, T.E., Newstetter, W.: The Aware Home: A Living Laboratory for Ubiquitous Computing Research. In: Proc. of the 2nd International Workshop on Cooperative Buildings (CoBuild’99). LNCS, vol. 1670, pp. 191–198. Springer, Heidelberg (1999)

    Google Scholar 

  8. Brumitt, B., Meyers, B., Krumm, J., Kern, A., Shafer, S.: EasyLiving: Technologies for Intelligent Environments. In: Proc. of the 2nd International Symposium on Handheld and Ubiquitous Computing (HUC’00). LNCS, vol. 1927, pp. 12–29. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  9. Pentland, A.: Smart Clothes, Smart Rooms. In: Proc. of WETICE’01, vol. 3 (2001)

    Google Scholar 

  10. Brooks, R.A.: The Intelligent Room Project. In: Proc. of the 2nd International Conference on Cognitive Technology (CT’97), pp. 271–278 (1997)

    Google Scholar 

  11. Xie, W., Shi, Y., Xu, G., Xie, D.: Smart Classroom - An Intelligent Environment for Tele-education. In: Proc. of the 2nd IEEE Pacific-Rim Conference on Multimedia (PCM’01). LNCS, vol. 2195, pp. 662–668. Springer, Heidelberg (2001)

    Google Scholar 

  12. Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: Proc. of the First IEEE International Conference on Pervasive Computing and Communications (PerCom’03), pp. 489–496 (2003)

    Google Scholar 

  13. Kottahachchi, B., Laddaga, R.: Access Controls for Intelligent Environments. In: Proc. of the 4th Annual International Conference on Intelligent Systems Design and Applications (ISDA’04) (2004)

    Google Scholar 

  14. Sampemane, G., Naldurg, P., Campbell, R.H.: Access Control for Active Spaces. In: Proc. of the 18th Annual Computer Security Applications Conference (ACSAC’02), pp. 343–352 (2002)

    Google Scholar 

  15. Song, Y.J., Tobagus, W., Leong, D.Y., Johanson, B., Fox, A.: iSecurity: A Security Framework for Interactive Workspaces. Tech Report, Stanford University (2004)

    Google Scholar 

  16. Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing Context-Aware Applications Using Environment Roles. In: Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT’01), pp. 10–20 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Takeshi Okadome Tatsuya Yamazaki Mounir Makhtari

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Hattori, S., Tanaka, K. (2007). Secure Spaces: Protecting Freedom of Information Access in Public Places. In: Okadome, T., Yamazaki, T., Makhtari, M. (eds) Pervasive Computing for Quality of Life Enhancement. ICOST 2007. Lecture Notes in Computer Science, vol 4541. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73035-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73035-4_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73034-7

  • Online ISBN: 978-3-540-73035-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics