Research on Environment-Driven Secure Network Systems
Project/Area Number |
16360195
|
Research Category |
Grant-in-Aid for Scientific Research (B)
|
Allocation Type | Single-year Grants |
Section | 一般 |
Research Field |
Communication/Network engineering
|
Research Institution | National Institute of Informatics |
Principal Investigator |
YAMADA Shigeki National Institute of Informatics, Information Systems Architecture Research Division, Professor, アーキテクチャ科学研究系, 教授 (80332154)
|
Co-Investigator(Kenkyū-buntansha) |
KAMIOKA Eiji National Institute of Informatics, Information Systems Architecture Research Division, Assistant Professor, アーキテクチャ科学研究系, 助手 (90311175)
|
Project Period (FY) |
2004 – 2006
|
Project Status |
Completed (Fiscal Year 2006)
|
Budget Amount *help |
¥14,300,000 (Direct Cost: ¥14,300,000)
Fiscal Year 2006: ¥4,700,000 (Direct Cost: ¥4,700,000)
Fiscal Year 2005: ¥4,700,000 (Direct Cost: ¥4,700,000)
Fiscal Year 2004: ¥4,900,000 (Direct Cost: ¥4,900,000)
|
Keywords | Mobile Network / Ad Hoc Network / Privacy Protection / Context-Aware / Access Control / Security / Mobile Agent / Architecture / ハンドオーバ / モビリティ / シームレスサービス / サービスモビリティ / ネットワークアーキテクチャ / ユビキタスネットワーク / ユビキタスコンピューティング |
Research Abstract |
This research project divides the research issues on security and privacy in the ubiquitous computing environment into five research themes. The research results of these five themes are summarized as follows. 1.User Site-Oriented Privacy Protection Architecture EMAPP The Encapsulated Mobile Agent-Based Privacy Protection architecture EMAPP is proposed that allows mobile agents to migrate into the privacy capsule of a user system, execute necessary processes by referring to the personal data kept in the capsule. Only the computational results are allowed to flow out to the outside world. As personal data are prohibited by the capsule to leak out from the capsule, EMAPP achieves a robust privacy protection. 2.Trusted Third Party-Oriented Privacy Protection Architecture iCOP Another privacy architecture called iCOP is proposed that allows mobile agents, each containing user's personal data, to migrate into the agent platform of a trusted third party, execute necessary processes by referring
… More
to the personal data brought into the platform. Only the computational results are allowed to flow out to the outside world. As the computational results are checked by the platform to avoid that any personal data will leak out to the outside world, iCOP provides another solution for robust privacy protection. 3.Application of iCOP Architecture to Multi-party Computation Problems A mobile-agent-based meeting scheduling scheme called EPMS and a privacy measurement metric called Min metric are proposed. The security policies are devised for the iCOP platform. These policies can effectively protect privacy while solving many multi-party computation problems. 4.An Incentive Mechanism to Promote Node Cooperation in Wireless Ad Hoc Networks A price-demand function based incentive model (PDM) is proposed for wireless ad hoc network in which relay nodes forward the packets from a source node to a destination node. In the PDM model, the network is modeled as a market, where the pricing is determined by the source node's demand and the relay node's service supply. 5.A Context-Aware Access Control Architecture ACA2 for Ubiquitous Services A context aware access control architecture ACA2 is proposed, based on a distributed context-change detection mechanism that can dynamically change access rights according to current context even if a trust-based relationship has not been formed between a service provider and a service user. This architecture features (1) ad-hoc use, (2) scalable mechanism for detecting context changes, and (3) provision of trusted context. Less
|
Report
(4 results)
Research Products
(158 results)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
[Journal Article] ューザ指向タイムクリティカルネットワークにおける多体多マルチキャストツリーの特性評価2005
Author(s)
唐澤肇, 寺田真介, 三好匠, 田中良明, 矢守恭子, 山田茂樹, 上岡英史, 井手口哲夫, 奥田隆史, 福田晃, 北須賀輝明
-
Journal Title
情報学ワークショップ2005論文集
Pages: 255-260
Description
「研究成果報告書概要(和文)」より
Related Report
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
[Journal Article] ユーザ指向タイムクリティカルネットワークにおける多対多マルチキャストツリーの特性評価2005
Author(s)
唐澤肇, 寺田真介, 三好匠, 田中良明, 矢守恭子, 山田茂樹, 上岡英史, 井手口哲夫, 奥田隆史, 福田晃, 北須賀輝明
-
Journal Title
情報学ワークショップ2005(WiNF2005)論文集
Pages: 255-260
Related Report
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
[Book] インターネットが電話になった2005
Author(s)
山田茂樹, 橋爪宏達, 藤岡淳, 佐藤健
Total Pages
200
Publisher
丸善ライブラリ
Description
「研究成果報告書概要(和文)」より
Related Report
-
-