Improving security for ubiquitous campus applications

Kenta Matsumiya, Shuhei Tamaru, Genta Suzuki, Jin Nakazawa, Kazunori Takashio, Hideyuki Tokuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

This paper identifies security issues posed by ubiquitous computing applications used in university campuses, and propose software architectures to address the issues. Applications in ubiquitous computing environment exploit interactions between personal and public devices, and adapt to user's context. Security issues posed by these applications are privacy, usability, and hybrid scheme. Privacy Profile Negotiation Protocol (PPNP) allows users to change the granularity of their personal profile presented to profileaware services, in order to preserve privacy, and Zero-stop Authentication System (ZSAS) provides real-time automatic authentication of users to leverage usability of user authentication in the physical space. We also present several applications to outline the usage of these systems.

Original languageEnglish
Title of host publicationProceedings - International Symposium on Applications and the Internet Workshops
Pages417-422
Number of pages6
Publication statusPublished - 2004
EventProceedings - 2004 International Symposium on Applications and the Internet Workshops (Saint 2004Workshop) - Tokyo, Japan
Duration: 2004 Jan 262004 Jan 30

Other

OtherProceedings - 2004 International Symposium on Applications and the Internet Workshops (Saint 2004Workshop)
CountryJapan
CityTokyo
Period04/1/2604/1/30

Fingerprint

Authentication
Ubiquitous computing
Software architecture
Real time systems
Network protocols

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Matsumiya, K., Tamaru, S., Suzuki, G., Nakazawa, J., Takashio, K., & Tokuda, H. (2004). Improving security for ubiquitous campus applications. In Proceedings - International Symposium on Applications and the Internet Workshops (pp. 417-422)

Improving security for ubiquitous campus applications. / Matsumiya, Kenta; Tamaru, Shuhei; Suzuki, Genta; Nakazawa, Jin; Takashio, Kazunori; Tokuda, Hideyuki.

Proceedings - International Symposium on Applications and the Internet Workshops. 2004. p. 417-422.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Matsumiya, K, Tamaru, S, Suzuki, G, Nakazawa, J, Takashio, K & Tokuda, H 2004, Improving security for ubiquitous campus applications. in Proceedings - International Symposium on Applications and the Internet Workshops. pp. 417-422, Proceedings - 2004 International Symposium on Applications and the Internet Workshops (Saint 2004Workshop), Tokyo, Japan, 04/1/26.
Matsumiya K, Tamaru S, Suzuki G, Nakazawa J, Takashio K, Tokuda H. Improving security for ubiquitous campus applications. In Proceedings - International Symposium on Applications and the Internet Workshops. 2004. p. 417-422
Matsumiya, Kenta ; Tamaru, Shuhei ; Suzuki, Genta ; Nakazawa, Jin ; Takashio, Kazunori ; Tokuda, Hideyuki. / Improving security for ubiquitous campus applications. Proceedings - International Symposium on Applications and the Internet Workshops. 2004. pp. 417-422
@inproceedings{7fad41c647aa441b9335511d5132aa8d,
title = "Improving security for ubiquitous campus applications",
abstract = "This paper identifies security issues posed by ubiquitous computing applications used in university campuses, and propose software architectures to address the issues. Applications in ubiquitous computing environment exploit interactions between personal and public devices, and adapt to user's context. Security issues posed by these applications are privacy, usability, and hybrid scheme. Privacy Profile Negotiation Protocol (PPNP) allows users to change the granularity of their personal profile presented to profileaware services, in order to preserve privacy, and Zero-stop Authentication System (ZSAS) provides real-time automatic authentication of users to leverage usability of user authentication in the physical space. We also present several applications to outline the usage of these systems.",
author = "Kenta Matsumiya and Shuhei Tamaru and Genta Suzuki and Jin Nakazawa and Kazunori Takashio and Hideyuki Tokuda",
year = "2004",
language = "English",
isbn = "0769520502",
pages = "417--422",
booktitle = "Proceedings - International Symposium on Applications and the Internet Workshops",

}

TY - GEN

T1 - Improving security for ubiquitous campus applications

AU - Matsumiya, Kenta

AU - Tamaru, Shuhei

AU - Suzuki, Genta

AU - Nakazawa, Jin

AU - Takashio, Kazunori

AU - Tokuda, Hideyuki

PY - 2004

Y1 - 2004

N2 - This paper identifies security issues posed by ubiquitous computing applications used in university campuses, and propose software architectures to address the issues. Applications in ubiquitous computing environment exploit interactions between personal and public devices, and adapt to user's context. Security issues posed by these applications are privacy, usability, and hybrid scheme. Privacy Profile Negotiation Protocol (PPNP) allows users to change the granularity of their personal profile presented to profileaware services, in order to preserve privacy, and Zero-stop Authentication System (ZSAS) provides real-time automatic authentication of users to leverage usability of user authentication in the physical space. We also present several applications to outline the usage of these systems.

AB - This paper identifies security issues posed by ubiquitous computing applications used in university campuses, and propose software architectures to address the issues. Applications in ubiquitous computing environment exploit interactions between personal and public devices, and adapt to user's context. Security issues posed by these applications are privacy, usability, and hybrid scheme. Privacy Profile Negotiation Protocol (PPNP) allows users to change the granularity of their personal profile presented to profileaware services, in order to preserve privacy, and Zero-stop Authentication System (ZSAS) provides real-time automatic authentication of users to leverage usability of user authentication in the physical space. We also present several applications to outline the usage of these systems.

UR - http://www.scopus.com/inward/record.url?scp=2642537855&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=2642537855&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:2642537855

SN - 0769520502

SP - 417

EP - 422

BT - Proceedings - International Symposium on Applications and the Internet Workshops

ER -