An anonymous context aware access control architecture for ubiquitous services

Shigetoshi Yokoyama, Eiji Kamioka, Shigeki Yamada

研究成果: Conference contribution

7 引用 (Scopus)

抄録

A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.

元の言語English
ホスト出版物のタイトルProceedings - IEEE International Conference on Mobile Data Management
2006
DOI
出版物ステータスPublished - 2006
外部発表Yes
イベント7th International Conference on Mobile Data Management, 2006. MDM 2006 - Nara
継続期間: 2006 5 102006 5 12

Other

Other7th International Conference on Mobile Data Management, 2006. MDM 2006
Nara
期間06/5/1006/5/12

Fingerprint

Access control
Telephone

ASJC Scopus subject areas

  • Engineering(all)

これを引用

Yokoyama, S., Kamioka, E., & Yamada, S. (2006). An anonymous context aware access control architecture for ubiquitous services. : Proceedings - IEEE International Conference on Mobile Data Management (巻 2006). [1630610] https://doi.org/10.1109/MDM.2006.31

An anonymous context aware access control architecture for ubiquitous services. / Yokoyama, Shigetoshi; Kamioka, Eiji; Yamada, Shigeki.

Proceedings - IEEE International Conference on Mobile Data Management. 巻 2006 2006. 1630610.

研究成果: Conference contribution

Yokoyama, S, Kamioka, E & Yamada, S 2006, An anonymous context aware access control architecture for ubiquitous services. : Proceedings - IEEE International Conference on Mobile Data Management. 巻. 2006, 1630610, 7th International Conference on Mobile Data Management, 2006. MDM 2006, Nara, 06/5/10. https://doi.org/10.1109/MDM.2006.31
Yokoyama S, Kamioka E, Yamada S. An anonymous context aware access control architecture for ubiquitous services. : Proceedings - IEEE International Conference on Mobile Data Management. 巻 2006. 2006. 1630610 https://doi.org/10.1109/MDM.2006.31
Yokoyama, Shigetoshi ; Kamioka, Eiji ; Yamada, Shigeki. / An anonymous context aware access control architecture for ubiquitous services. Proceedings - IEEE International Conference on Mobile Data Management. 巻 2006 2006.
@inproceedings{1be8734238704f3ba647af8f460b257c,
title = "An anonymous context aware access control architecture for ubiquitous services",
abstract = "A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.",
author = "Shigetoshi Yokoyama and Eiji Kamioka and Shigeki Yamada",
year = "2006",
doi = "10.1109/MDM.2006.31",
language = "English",
isbn = "0769525261",
volume = "2006",
booktitle = "Proceedings - IEEE International Conference on Mobile Data Management",

}

TY - GEN

T1 - An anonymous context aware access control architecture for ubiquitous services

AU - Yokoyama, Shigetoshi

AU - Kamioka, Eiji

AU - Yamada, Shigeki

PY - 2006

Y1 - 2006

N2 - A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.

AB - A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by their context information through preregistered software components called proxies. The main features of the architecture include anonymity, access suspension caused by context changes, and active context certificates with stream verification.

UR - http://www.scopus.com/inward/record.url?scp=33751045331&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33751045331&partnerID=8YFLogxK

U2 - 10.1109/MDM.2006.31

DO - 10.1109/MDM.2006.31

M3 - Conference contribution

AN - SCOPUS:33751045331

SN - 0769525261

SN - 9780769525266

VL - 2006

BT - Proceedings - IEEE International Conference on Mobile Data Management

ER -