Abstract | ||
---|---|---|
Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1093/ietcom/e88-b.3.846 | IEICE TRANSACTIONS ON COMMUNICATIONS |
Keywords | DocType | Volume |
ubiquitous computing, access control, security, privacy, context, trust | Journal | E88B |
Issue | ISSN | Citations |
3 | 0916-8516 | 13 |
PageRank | References | Authors |
1.15 | 0 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yamada S | 1 | 235 | 38.98 |
Eiji Kamioka | 2 | 96 | 21.65 |