Secure Spaces: Protecting Freedom of Information Access in Public Places

  • Shun Hattori
  • Katsumi Tanaka
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4541)


In public places, information can be accessed by its unauthorized users, while we are sometimes forced to access our unwanted information unexpectedly. We have introduced the concept of Secure Spaces, physical environments where any information is always protected from its unauthorized users, and have proposed a content-based entry control model and an architecture for Secure Spaces which protect their contents’ freedom of information delivery but do not protect their visitors’ freedom of information access. This paper aims at building truly Secure Spaces which protect both freedoms and enhances our proposed model.


Ubiquitous Computing Information Access Physical Resource Access Policy Virtual Resource 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hattori, S., Tezuka, T., Tanaka, K.: Content-Based Entry Control for Secure Spaces. In: Proc. of the International Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT’06) in conjunction with MDM’06, vol. 98 (2006)Google Scholar
  2. 2.
    Hattori, S., Tezuka, T., Tanaka, K.: Secure Spaces: Physically Protected Environments for Information Security. In: Proc. of the Joint 3rd International Conference on Soft Computing and Intelligent Systems and 7th International Symposium on advanced Intelligent Systems (SCIS&ISIS’06), pp. 687–691 (2006)Google Scholar
  3. 3.
    Rosenthal, L., Stanford, V.M.: NIST Smart Space: Pervasive Computing Initiative. In: Proc. of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’00), pp. 6–11 (2000)Google Scholar
  4. 4.
    Coen, M.H.: Design Principles for Intelligent Environments. In: Proc. of the 15th National/10th Conference on Artificial Intelligence/Innovative Applications of Artificial Intelligence (AAAI/IAAI’98), pp. 547–554 (1998)Google Scholar
  5. 5.
    Roman, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: Gaia: A Middleware Infrastructure to Enable Active Spaces. IEEE Pervasive Computing 1(4), 74–83 (2002)CrossRefGoogle Scholar
  6. 6.
    Johanson, B., Fox, A., Winograd, T.: The Interactive Workspaces Project: Experiences With Ubiquitous Computing Rooms. IEEE Pervasive Computing 1(2), 67–74 (2002)CrossRefGoogle Scholar
  7. 7.
    Kidd, C.D., Orr, R., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E., Starner, T.E., Newstetter, W.: The Aware Home: A Living Laboratory for Ubiquitous Computing Research. In: Proc. of the 2nd International Workshop on Cooperative Buildings (CoBuild’99). LNCS, vol. 1670, pp. 191–198. Springer, Heidelberg (1999)Google Scholar
  8. 8.
    Brumitt, B., Meyers, B., Krumm, J., Kern, A., Shafer, S.: EasyLiving: Technologies for Intelligent Environments. In: Proc. of the 2nd International Symposium on Handheld and Ubiquitous Computing (HUC’00). LNCS, vol. 1927, pp. 12–29. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. 9.
    Pentland, A.: Smart Clothes, Smart Rooms. In: Proc. of WETICE’01, vol. 3 (2001)Google Scholar
  10. 10.
    Brooks, R.A.: The Intelligent Room Project. In: Proc. of the 2nd International Conference on Cognitive Technology (CT’97), pp. 271–278 (1997)Google Scholar
  11. 11.
    Xie, W., Shi, Y., Xu, G., Xie, D.: Smart Classroom - An Intelligent Environment for Tele-education. In: Proc. of the 2nd IEEE Pacific-Rim Conference on Multimedia (PCM’01). LNCS, vol. 2195, pp. 662–668. Springer, Heidelberg (2001)Google Scholar
  12. 12.
    Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: Proc. of the First IEEE International Conference on Pervasive Computing and Communications (PerCom’03), pp. 489–496 (2003)Google Scholar
  13. 13.
    Kottahachchi, B., Laddaga, R.: Access Controls for Intelligent Environments. In: Proc. of the 4th Annual International Conference on Intelligent Systems Design and Applications (ISDA’04) (2004)Google Scholar
  14. 14.
    Sampemane, G., Naldurg, P., Campbell, R.H.: Access Control for Active Spaces. In: Proc. of the 18th Annual Computer Security Applications Conference (ACSAC’02), pp. 343–352 (2002)Google Scholar
  15. 15.
    Song, Y.J., Tobagus, W., Leong, D.Y., Johanson, B., Fox, A.: iSecurity: A Security Framework for Interactive Workspaces. Tech Report, Stanford University (2004)Google Scholar
  16. 16.
    Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing Context-Aware Applications Using Environment Roles. In: Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT’01), pp. 10–20 (2001)Google Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Shun Hattori
    • 1
  • Katsumi Tanaka
    • 1
  1. 1.Department of Social Informatics, Graduate School of Informatics, Kyoto University, Yoshida-Honmachi, Sakyo, Kyoto 606-8501Japan

Personalised recommendations