The search functionality is under construction.

IEICE TRANSACTIONS on Communications

Access Control for Security and Privacy in Ubiquitous Computing Environments

Shigeki YAMADA, Eiji KAMIOKA

  • Full Text Views

    0

  • Cite this

Summary :

Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.

Publication
IEICE TRANSACTIONS on Communications Vol.E88-B No.3 pp.846-856
Publication Date
2005/03/01
Publicized
Online ISSN
DOI
10.1093/ietcom/e88-b.3.846
Type of Manuscript
Special Section INVITED PAPER (Special Section on Ubiquitous Networks)
Category

Authors

Keyword