Access control for security and privacy in ubiquitous computing environments

Shigeki Yamada, Eiji Kamioka

Research output: Contribution to journalReview article

15 Citations (Scopus)

Abstract

Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.

Original languageEnglish
Pages (from-to)846-855
Number of pages10
JournalIEICE Transactions on Communications
VolumeE88-B
Issue number3
DOIs
Publication statusPublished - 2005 Jan 1

Keywords

  • Access control
  • Context
  • Privacy
  • Security
  • Trust
  • Ubiquitous computing

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Access control for security and privacy in ubiquitous computing environments'. Together they form a unique fingerprint.

  • Cite this