An approach of trusted program generation for user-responsible privacy

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Presently, one can use services on the Internet. These services require user's sensitive information such as name, address, credit card number, etc. However, various privacy problems such as information leakage cases are becoming serious social concern. Therefore, we propose a framework to protect user's sensitive information. It allows a user to specify the usage of his/her sensitive information and restricts the use of information by an information recipient. The main concept of the framework is that an information recipient can use sensitive information only in the manner considered safe by the information owner. This is realized by a trusted program that implements the manner of information usage trusted by the information owner. The user offers his/her trusted program to an information recipient and requires to make use of the user's sensitive information through the trusted program. In this paper, we propose the approach for trusted program generation. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Takahashi, K., Liu, Z., Sakurai, K., & Amamiya, M. (2007). An approach of trusted program generation for user-responsible privacy. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4611 LNCS, pp. 1159–1170). Springer Verlag. https://doi.org/10.1007/978-3-540-73549-6_113

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free