An overlay authentication network for active utilization of private information

Akihiro Nakarai, Akira Sakatoku, Atsushi Takeda, Gen Kitagata, Debasish Chakraborty, Kazuo Hashimoto, Norio Shiratori

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we propose an overlay authentication network for active utilization of private information. The proposed network realizes safe registration and usage of users' private information. In addition, the proposed network realizes the distributed management and utilization of users' private information. These features enable services which utilize users' private information. In this paper, we present implementation of the prototype system based on the proposed network, and confirm the effectiveness of the proposed network.

Original languageEnglish
Title of host publicationProceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010
Pages185-188
Number of pages4
DOIs
Publication statusPublished - 2010 Nov 29
Event2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 - Seoul, Korea, Republic of
Duration: 2010 Jul 192010 Jul 23

Publication series

NameProceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010

Conference

Conference2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010
CountryKorea, Republic of
CitySeoul
Period10/7/1910/7/23

Keywords

  • Distributed authentication
  • Overlay networks
  • Privacy
  • Private information utilization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'An overlay authentication network for active utilization of private information'. Together they form a unique fingerprint.

  • Cite this

    Nakarai, A., Sakatoku, A., Takeda, A., Kitagata, G., Chakraborty, D., Hashimoto, K., & Shiratori, N. (2010). An overlay authentication network for active utilization of private information. In Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 (pp. 185-188). [5598146] (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010). https://doi.org/10.1109/SAINT.2010.77