JACIII Vol.11 No.8 pp. 1023-1029
doi: 10.20965/jaciii.2007.p1023


Towards Building Secure Smart Spaces for Information Security in the Physical World

Shun Hattori and Katsumi Tanaka

Department of Social Informatics, Graduate School of Informatics, Kyoto University, Yoshida-Honmachi, Sakyo, Kyoto 606-8501, Japan

March 19, 2007
May 24, 2007
October 20, 2007
smart spaces, information security, access control, context awareness, ubiquitous computing
This paper introduces the concept of Secure Spaces, one step ahead of Smart Spaces, on information security. We define Secure Spaces as physically isolated environments in which any resource is completely protected from its unauthorized objects with respect to information security. In other words, only if inside them, any information resource is completely protected from being accessed by its unauthorized visitors, and any visitor is completely protected from being exposed to her unwanted information resources. To build such a secure Smart Space, we propose a formalized model and architecture for space entry control based on its dynamically changing contents such as its visitors, physical information resources, and virtual information resources via its embedded output devices.
Cite this article as:
S. Hattori and K. Tanaka, “Towards Building Secure Smart Spaces for Information Security in the Physical World,” J. Adv. Comput. Intell. Intell. Inform., Vol.11 No.8, pp. 1023-1029, 2007.
Data files:
  1. [1] S. Hattori, T. Tezuka, and K. Tanaka, “Content-Based Entry Control for Secure Spaces,” Proc. of the Int. Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT’06) in conjunction with the 7th Int. Conf. on Mobile Data Management (MDM’06), p. 98, May, 2006.
  2. [2] S. Hattori and K. Tanaka, “Secure Spaces: Protecting Freedom of Information Access in Public Places,” Proc. of the 5th Int. Conf. on Smart Homes and Health Telematics (ICOST’07), LNCS Vol.4541, pp. 99-109, June, 2007.
  3. [3] L. Rosenthal and V. Stanford, “NIST Smart Space: Pervasive Computing Initiative,” Proc. of the 9th IEEE Int.Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’00), pp. 6-11, June, 2000.
  4. [4] J. Al-Muhtadi, A. Ranganathan, R. Campbell, and M. D. Mickunas, “Cerberus: A Context-aware Security Scheme for Smart Spaces,” Proc. of the 1st IEEE Int. Conf. on Pervasive Computing and Communications (PerCom’03), pp. 489-496, March, 2003.
  5. [5] G. Sampemane, P. Naldurg, and R. H. Campbell, “Access Control for Active Spaces,” Proc. of the 18th Annual Computer Security Applications Conf. (ACSAC’02), pp. 343-352, December, 2002.
  6. [6] Y. J. Song, W. Tobagus, D. Y. Leong, B. Johanson, and A. Fox, “iSecurity: A Security Framework for Interactive Workspaces,” Technical Report, Stanford University, September, 2003.
  7. [7] M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, and G. D. Abowd, “Securing Context-aware Applications Using Environment Roles,” Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT’01), pp. 10-20, May, 2001.
  8. [8] B. Brumitt, B. Meyers, J. Krumm, A. Kern, and S. Shafer, “EasyLiving: Technologies for Intelligent Environments,” Proc. of the 2nd Int. Symposium on Handheld and Ubiquitous Computing (HUC’00), LNCS Vol.1927, pp. 12-29, September, 2000.
  9. [9] P. G. McLean, “A Secure Pervasive Environment,” Proc. of the Australasian Information Security Workshop (AISW’03) in conjunction with the Australasian Computer Science Week 2003 (ACSW’03), Vol.21, pp. 67-75, January, 2003.
  10. [10] B. Kottahachchi and R. Laddaga, “Access Controls for Intelligent Environments,” Proc. of the 4th Annual Int. Conf. on Intelligent Systems Design and Applications (ISDA’04), August, 2004.

*This site is desgined based on HTML5 and CSS3 for modern browsers, e.g. Chrome, Firefox, Safari, Edge, Opera.

Last updated on May. 28, 2024