Abstract
The evolution of mobile technologies enables us to realize ubiquitous computing environments. In such environments, a user's mobile terminal manages the sensitive information and assists in various activities based on the user's information. At the same time, information leakage will become a serious social problem. In this paper, we propose a framework to protect the sensitive information of users in a manner they consider safe. In the framework, the user provides a trusted program that implements the manner he/she considers safe. The information recipient accesses user's sensitive information through this trusted program. In this manner, the user can protect his/her sensitive information. However, there exist several challenges in the realization of this framework. In this paper, we propose a method for generating a trusted program and discuss the solutions to other challenges.
Original language | English |
---|---|
Pages (from-to) | 59-70 |
Number of pages | 12 |
Journal | International Journal of Security and its Applications |
Volume | 1 |
Issue number | 2 |
Publication status | Published - Dec 1 2007 |
All Science Journal Classification (ASJC) codes
- Computer Science(all)