원문정보
초록
영어
The evolution of mobile technologies enables us to realize ubiquitous computing
environments. In such environments, a user’s mobile terminal manages the sensitive
information and assists in various activities based on the user’s information. At the same time,
information leakage will become a serious social problem. In this paper, we propose a
framework to protect the sensitive information of users in a manner they consider safe. In the
framework, the user provides a trusted program that implements the manner he/she considers
safe. The information recipient accesses user’s sensitive information through this trusted
program. In this manner, the user can protect his/her sensitive information. However, there
exist several challenges in the realization of this framework. In this paper, we propose a
method for generating a trusted program and discuss the solutions to other challenges.
목차
1. Introduction
2. Related works
3. Information protection framework
3.1. An overview
3.2. Challenges faced by the framework
4. Trusted-program generation
4.1. Usage and protection policy
4.2. Program conversion rule
4.3. Example of the trusted program generation
5. Discussion on other challenges
5.1. Protection of a trusted program from a service provider
5.2. Confirmation of trusted program behaviour
6. Conclusions
7. Acknowledgments
8. References