Real-World Oriented Access Control Method with a Displayed Password View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2004

AUTHORS

Yuji Ayatsuka , Michimune Kohno , Jun Rekimoto

ABSTRACT

Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered users or devices, and security issues arise if visitors are permitted to use networked resources in an office and have accessibility to other resources. We propose a new access control method that uses frequently changing passwords which are displayed beside the resource. This method provides real-world-oriented access control over an internet without any need for special hardware such as sensors. More... »

PAGES

19-29

Book

TITLE

Computer Human Interaction

ISBN

978-3-540-22312-2
978-3-540-27795-8

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-27795-8_3

DOI

http://dx.doi.org/10.1007/978-3-540-27795-8_3

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1046848378


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Sony Computer Science Laboratories", 
          "id": "https://www.grid.ac/institutes/grid.452725.3", 
          "name": [
            "Interaction Laboratory, Sony Computer Science Laboratories, Inc., 3\u201314\u201313 Higashi-Gotanda, Shinagawa-ku, 141\u20130022, Tokyo, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ayatsuka", 
        "givenName": "Yuji", 
        "id": "sg:person.010412517731.21", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010412517731.21"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Sony Computer Science Laboratories", 
          "id": "https://www.grid.ac/institutes/grid.452725.3", 
          "name": [
            "Interaction Laboratory, Sony Computer Science Laboratories, Inc., 3\u201314\u201313 Higashi-Gotanda, Shinagawa-ku, 141\u20130022, Tokyo, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kohno", 
        "givenName": "Michimune", 
        "id": "sg:person.010226167105.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010226167105.32"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Sony Computer Science Laboratories", 
          "id": "https://www.grid.ac/institutes/grid.452725.3", 
          "name": [
            "Interaction Laboratory, Sony Computer Science Laboratories, Inc., 3\u201314\u201313 Higashi-Gotanda, Shinagawa-ku, 141\u20130022, Tokyo, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rekimoto", 
        "givenName": "Jun", 
        "id": "sg:person.012476504203.81", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012476504203.81"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/634067.634261", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1000031629"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/128756.128759", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001657596"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/257089.257328", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004057305"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/215585.215639", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1031913378"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/263407.263505", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038375874"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/280814.280940", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040412263"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mmcs.1999.779193", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093854651"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/apchi.1998.704151", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095137685"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2004", 
    "datePublishedReg": "2004-01-01", 
    "description": "Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered users or devices, and security issues arise if visitors are permitted to use networked resources in an office and have accessibility to other resources. We propose a new access control method that uses frequently changing passwords which are displayed beside the resource. This method provides real-world-oriented access control over an internet without any need for special hardware such as sensors.", 
    "editor": [
      {
        "familyName": "Masoodian", 
        "givenName": "Masood", 
        "type": "Person"
      }, 
      {
        "familyName": "Jones", 
        "givenName": "Steve", 
        "type": "Person"
      }, 
      {
        "familyName": "Rogers", 
        "givenName": "Bill", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-27795-8_3", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-22312-2", 
        "978-3-540-27795-8"
      ], 
      "name": "Computer Human Interaction", 
      "type": "Book"
    }, 
    "name": "Real-World Oriented Access Control Method with a Displayed Password", 
    "pagination": "19-29", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1046848378"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-27795-8_3"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "df2afedaa05dc1fd6317ca3fe36d0a07e6366cecd37216fd3c6b0d86a99e27a1"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-27795-8_3", 
      "https://app.dimensions.ai/details/publication/pub.1046848378"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T08:29", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000363_0000000363/records_70068_00000002.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-540-27795-8_3"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-27795-8_3'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-27795-8_3'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-27795-8_3'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-27795-8_3'


 

This table displays all metadata directly associated to this object as RDF triples.

113 TRIPLES      23 PREDICATES      35 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-27795-8_3 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author Ne8f6f383a9b9432b9e4a171029f3fe9e
4 schema:citation https://doi.org/10.1109/apchi.1998.704151
5 https://doi.org/10.1109/mmcs.1999.779193
6 https://doi.org/10.1145/128756.128759
7 https://doi.org/10.1145/215585.215639
8 https://doi.org/10.1145/257089.257328
9 https://doi.org/10.1145/263407.263505
10 https://doi.org/10.1145/280814.280940
11 https://doi.org/10.1145/634067.634261
12 schema:datePublished 2004
13 schema:datePublishedReg 2004-01-01
14 schema:description Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered users or devices, and security issues arise if visitors are permitted to use networked resources in an office and have accessibility to other resources. We propose a new access control method that uses frequently changing passwords which are displayed beside the resource. This method provides real-world-oriented access control over an internet without any need for special hardware such as sensors.
15 schema:editor Nc86867c2f38b4bb99b7e994f0717b8e4
16 schema:genre chapter
17 schema:inLanguage en
18 schema:isAccessibleForFree false
19 schema:isPartOf N08e5087d707e47269f891f84c675afca
20 schema:name Real-World Oriented Access Control Method with a Displayed Password
21 schema:pagination 19-29
22 schema:productId N236f539cf8874d8881dc1f852fea3663
23 N8337cb203b604cb99768469ec43f7f5c
24 Nf90166107ee44897849c3054c5cd56e4
25 schema:publisher Ndcf487fc991e48b2aa6414a633137711
26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046848378
27 https://doi.org/10.1007/978-3-540-27795-8_3
28 schema:sdDatePublished 2019-04-16T08:29
29 schema:sdLicense https://scigraph.springernature.com/explorer/license/
30 schema:sdPublisher N3de6de3a013a47e38e28fa12c70ad2e2
31 schema:url https://link.springer.com/10.1007%2F978-3-540-27795-8_3
32 sgo:license sg:explorer/license/
33 sgo:sdDataset chapters
34 rdf:type schema:Chapter
35 N08e5087d707e47269f891f84c675afca schema:isbn 978-3-540-22312-2
36 978-3-540-27795-8
37 schema:name Computer Human Interaction
38 rdf:type schema:Book
39 N14c619fb0a004ef6b1cd21e72687a575 rdf:first Nc66a822ed5b8408f925f3c018b1435c9
40 rdf:rest rdf:nil
41 N236f539cf8874d8881dc1f852fea3663 schema:name doi
42 schema:value 10.1007/978-3-540-27795-8_3
43 rdf:type schema:PropertyValue
44 N29da12fd808a49bd9914818628086de9 rdf:first N849e9a49635a4d079b1515ccbe1bb004
45 rdf:rest N14c619fb0a004ef6b1cd21e72687a575
46 N3de6de3a013a47e38e28fa12c70ad2e2 schema:name Springer Nature - SN SciGraph project
47 rdf:type schema:Organization
48 N3f3329741b784e77b23b93dd7ac0268e schema:familyName Masoodian
49 schema:givenName Masood
50 rdf:type schema:Person
51 N8337cb203b604cb99768469ec43f7f5c schema:name readcube_id
52 schema:value df2afedaa05dc1fd6317ca3fe36d0a07e6366cecd37216fd3c6b0d86a99e27a1
53 rdf:type schema:PropertyValue
54 N849e9a49635a4d079b1515ccbe1bb004 schema:familyName Jones
55 schema:givenName Steve
56 rdf:type schema:Person
57 N92322a07818a484b9ae538841a1790b1 rdf:first sg:person.012476504203.81
58 rdf:rest rdf:nil
59 Na3200184cccd4b20a57a358b81e88f6c rdf:first sg:person.010226167105.32
60 rdf:rest N92322a07818a484b9ae538841a1790b1
61 Nc66a822ed5b8408f925f3c018b1435c9 schema:familyName Rogers
62 schema:givenName Bill
63 rdf:type schema:Person
64 Nc86867c2f38b4bb99b7e994f0717b8e4 rdf:first N3f3329741b784e77b23b93dd7ac0268e
65 rdf:rest N29da12fd808a49bd9914818628086de9
66 Ndcf487fc991e48b2aa6414a633137711 schema:location Berlin, Heidelberg
67 schema:name Springer Berlin Heidelberg
68 rdf:type schema:Organisation
69 Ne8f6f383a9b9432b9e4a171029f3fe9e rdf:first sg:person.010412517731.21
70 rdf:rest Na3200184cccd4b20a57a358b81e88f6c
71 Nf90166107ee44897849c3054c5cd56e4 schema:name dimensions_id
72 schema:value pub.1046848378
73 rdf:type schema:PropertyValue
74 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
75 schema:name Information and Computing Sciences
76 rdf:type schema:DefinedTerm
77 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
78 schema:name Information Systems
79 rdf:type schema:DefinedTerm
80 sg:person.010226167105.32 schema:affiliation https://www.grid.ac/institutes/grid.452725.3
81 schema:familyName Kohno
82 schema:givenName Michimune
83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010226167105.32
84 rdf:type schema:Person
85 sg:person.010412517731.21 schema:affiliation https://www.grid.ac/institutes/grid.452725.3
86 schema:familyName Ayatsuka
87 schema:givenName Yuji
88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010412517731.21
89 rdf:type schema:Person
90 sg:person.012476504203.81 schema:affiliation https://www.grid.ac/institutes/grid.452725.3
91 schema:familyName Rekimoto
92 schema:givenName Jun
93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012476504203.81
94 rdf:type schema:Person
95 https://doi.org/10.1109/apchi.1998.704151 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095137685
96 rdf:type schema:CreativeWork
97 https://doi.org/10.1109/mmcs.1999.779193 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093854651
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1145/128756.128759 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001657596
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1145/215585.215639 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031913378
102 rdf:type schema:CreativeWork
103 https://doi.org/10.1145/257089.257328 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004057305
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1145/263407.263505 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038375874
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1145/280814.280940 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040412263
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1145/634067.634261 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000031629
110 rdf:type schema:CreativeWork
111 https://www.grid.ac/institutes/grid.452725.3 schema:alternateName Sony Computer Science Laboratories
112 schema:name Interaction Laboratory, Sony Computer Science Laboratories, Inc., 3–14–13 Higashi-Gotanda, Shinagawa-ku, 141–0022, Tokyo, Japan
113 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...