An anonymous context aware access control architecture for ubiquitous services

Shigetoshi Yokoyama, Eiji Kamioka, Shigeki Yamada

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.

Original languageEnglish
Title of host publicationProceedings - IEEE International Conference on Mobile Data Management
Volume2006
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event7th International Conference on Mobile Data Management, 2006. MDM 2006 - Nara
Duration: 2006 May 102006 May 12

Other

Other7th International Conference on Mobile Data Management, 2006. MDM 2006
CityNara
Period06/5/1006/5/12

Fingerprint

Access control
Telephone

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Yokoyama, S., Kamioka, E., & Yamada, S. (2006). An anonymous context aware access control architecture for ubiquitous services. In Proceedings - IEEE International Conference on Mobile Data Management (Vol. 2006). [1630610] https://doi.org/10.1109/MDM.2006.31

An anonymous context aware access control architecture for ubiquitous services. / Yokoyama, Shigetoshi; Kamioka, Eiji; Yamada, Shigeki.

Proceedings - IEEE International Conference on Mobile Data Management. Vol. 2006 2006. 1630610.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yokoyama, S, Kamioka, E & Yamada, S 2006, An anonymous context aware access control architecture for ubiquitous services. in Proceedings - IEEE International Conference on Mobile Data Management. vol. 2006, 1630610, 7th International Conference on Mobile Data Management, 2006. MDM 2006, Nara, 06/5/10. https://doi.org/10.1109/MDM.2006.31
Yokoyama S, Kamioka E, Yamada S. An anonymous context aware access control architecture for ubiquitous services. In Proceedings - IEEE International Conference on Mobile Data Management. Vol. 2006. 2006. 1630610 https://doi.org/10.1109/MDM.2006.31
Yokoyama, Shigetoshi ; Kamioka, Eiji ; Yamada, Shigeki. / An anonymous context aware access control architecture for ubiquitous services. Proceedings - IEEE International Conference on Mobile Data Management. Vol. 2006 2006.
@inproceedings{1be8734238704f3ba647af8f460b257c,
title = "An anonymous context aware access control architecture for ubiquitous services",
abstract = "A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.",
author = "Shigetoshi Yokoyama and Eiji Kamioka and Shigeki Yamada",
year = "2006",
doi = "10.1109/MDM.2006.31",
language = "English",
isbn = "0769525261",
volume = "2006",
booktitle = "Proceedings - IEEE International Conference on Mobile Data Management",

}

TY - GEN

T1 - An anonymous context aware access control architecture for ubiquitous services

AU - Yokoyama, Shigetoshi

AU - Kamioka, Eiji

AU - Yamada, Shigeki

PY - 2006

Y1 - 2006

N2 - A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.

AB - A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.

UR - http://www.scopus.com/inward/record.url?scp=33751045331&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33751045331&partnerID=8YFLogxK

U2 - 10.1109/MDM.2006.31

DO - 10.1109/MDM.2006.31

M3 - Conference contribution

AN - SCOPUS:33751045331

SN - 0769525261

SN - 9780769525266

VL - 2006

BT - Proceedings - IEEE International Conference on Mobile Data Management

ER -