|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Access Control for Security and Privacy in Ubiquitous Computing Environments
Shigeki YAMADA Eiji KAMIOKA
Publication
IEICE TRANSACTIONS on Communications
Vol.E88-B
No.3
pp.846-856 Publication Date: 2005/03/01 Online ISSN:
DOI: 10.1093/ietcom/e88-b.3.846 Print ISSN: 0916-8516 Type of Manuscript: Special Section INVITED PAPER (Special Section on Ubiquitous Networks) Category: Keyword: ubiquitous computing, access control, security, privacy, context, trust,
Full Text: PDF(1015.8KB)>>
Summary:
Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.
|
|
|