Access Control for Security and Privacy in Ubiquitous Computing Environments

Shigeki YAMADA  Eiji KAMIOKA  

IEICE TRANSACTIONS on Communications   Vol.E88-B    No.3    pp.846-856
Publication Date: 2005/03/01
Online ISSN: 
DOI: 10.1093/ietcom/e88-b.3.846
Print ISSN: 0916-8516
Type of Manuscript: Special Section INVITED PAPER (Special Section on Ubiquitous Networks)
ubiquitous computing,  access control,  security,  privacy,  context,  trust,  

Full Text: PDF>>
Buy this Article

Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.