Presentation 2004-11-18
Securing Data in Mobile Computing Environment
Md. Nurul HUDA, Eiji KAMIOKA, Shigeki YAMADA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Users in mobile computing environment need to move to different administrative and physical domains with their private resources and data to subscribe different kinds of services. Also, user programs are allowed to access resources of the service providers to provide required services. It becomes a great concern of misusing and stealing the user's as well as service provider's private data in such an open un-trusted environment. In this paper we investigate different functionalities that are needed to enforce privacy of the parties involved in delivering mobile services. Our mobile agent based privacy protection system provides privacy of both the user and service provider. The system separates service related data in the execution environment from the rest of the private data. It ensures that any misbehaving or malicious party can not take away or steal other's data from the execution environment. Thus the proposed system enforces data protection in mobile computing environment.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Privacy / Security / Mobile Agent
Paper # CQ2004-101,MoMuC2004-75
Date of Issue

Conference Information
Committee CQ
Conference Date 2004/11/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Communication Quality (CQ)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Securing Data in Mobile Computing Environment
Sub Title (in English)
Keyword(1) Privacy
Keyword(2) Security
Keyword(3) Mobile Agent
1st Author's Name Md. Nurul HUDA
1st Author's Affiliation The Graduate University for Advanced Studies()
2nd Author's Name Eiji KAMIOKA
2nd Author's Affiliation National Institute of Informatics
3rd Author's Name Shigeki YAMADA
3rd Author's Affiliation National Institute of Informatics
Date 2004-11-18
Paper # CQ2004-101,MoMuC2004-75
Volume (vol) vol.104
Number (no) 441
Page pp.pp.-
#Pages 6
Date of Issue