Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
A framework for protecting private information through user-trusted-program and its realizability
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Hi-index | 0.00 |
Presently, one can use services on the Internet. These services require user's sensitive information such as name, address, credit card number, etc. However, various privacy problems such as information leakage cases are becoming serious social concern. Therefore, we propose a framework to protect user's sensitive information. It allows a user to specify the usage of his/her sensitive information and restricts the use of information by an information recipient. The main concept of the framework is that an information recipient can use sensitive information only in the manner considered safe by the information owner. This is realized by a trusted program that implements the manner of information usage trusted by the information owner. The user offers his/her trusted program to an information recipient and requires to make use of the user's sensitive information through the trusted program. In this paper, we propose the approach for trusted program generation.