Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Shigeki YAMADA, Eiji KAMIOKA, "Access Control for Security and Privacy in Ubiquitous Computing Environments" in IEICE TRANSACTIONS on Communications,
vol. E88-B, no. 3, pp. 846-856, March 2005, doi: 10.1093/ietcom/e88-b.3.846.
Abstract: Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.
URL: https://global.ieice.org/en_transactions/communications/10.1093/ietcom/e88-b.3.846/_p
Copy
@ARTICLE{e88-b_3_846,
author={Shigeki YAMADA, Eiji KAMIOKA, },
journal={IEICE TRANSACTIONS on Communications},
title={Access Control for Security and Privacy in Ubiquitous Computing Environments},
year={2005},
volume={E88-B},
number={3},
pages={846-856},
abstract={Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.},
keywords={},
doi={10.1093/ietcom/e88-b.3.846},
ISSN={},
month={March},}
Copy
TY - JOUR
TI - Access Control for Security and Privacy in Ubiquitous Computing Environments
T2 - IEICE TRANSACTIONS on Communications
SP - 846
EP - 856
AU - Shigeki YAMADA
AU - Eiji KAMIOKA
PY - 2005
DO - 10.1093/ietcom/e88-b.3.846
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E88-B
IS - 3
JA - IEICE TRANSACTIONS on Communications
Y1 - March 2005
AB - Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.
ER -