Access control for security and privacy in ubiquitous computing environments

Shigeki Yamada, Eiji Kamioka

Research output: Contribution to journalArticle

15 Citations (Scopus)

Abstract

Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.

Original languageEnglish
Pages (from-to)846-855
Number of pages10
JournalIEICE Transactions on Communications
VolumeE88-B
Issue number3
DOIs
Publication statusPublished - 2005
Externally publishedYes

Fingerprint

Ubiquitous computing
Access control
Communication

Keywords

  • Access control
  • Context
  • Privacy
  • Security
  • Trust
  • Ubiquitous computing

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Cite this

Access control for security and privacy in ubiquitous computing environments. / Yamada, Shigeki; Kamioka, Eiji.

In: IEICE Transactions on Communications, Vol. E88-B, No. 3, 2005, p. 846-855.

Research output: Contribution to journalArticle

@article{589023e0921644528783a825a771c299,
title = "Access control for security and privacy in ubiquitous computing environments",
abstract = "Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.",
keywords = "Access control, Context, Privacy, Security, Trust, Ubiquitous computing",
author = "Shigeki Yamada and Eiji Kamioka",
year = "2005",
doi = "10.1093/ietcom/e88-b.3.846",
language = "English",
volume = "E88-B",
pages = "846--855",
journal = "IEICE Transactions on Communications",
issn = "0916-8516",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "3",

}

TY - JOUR

T1 - Access control for security and privacy in ubiquitous computing environments

AU - Yamada, Shigeki

AU - Kamioka, Eiji

PY - 2005

Y1 - 2005

N2 - Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.

AB - Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.

KW - Access control

KW - Context

KW - Privacy

KW - Security

KW - Trust

KW - Ubiquitous computing

UR - http://www.scopus.com/inward/record.url?scp=24144503764&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24144503764&partnerID=8YFLogxK

U2 - 10.1093/ietcom/e88-b.3.846

DO - 10.1093/ietcom/e88-b.3.846

M3 - Article

VL - E88-B

SP - 846

EP - 855

JO - IEICE Transactions on Communications

JF - IEICE Transactions on Communications

SN - 0916-8516

IS - 3

ER -