Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2406367.2406386acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmumConference Proceedingsconference-collections
research-article

Security in migratory interactive web applications

Published: 04 December 2012 Publication History

Abstract

In ubiquitous environments migratory interactive applications allow users to perform their tasks continuously across various devices. Users can push and pull migratory Web applications from one device to another for various reasons. However, the flexibility of such pervasive applications raises various security issues, such as the risk of theft of private information from the migrated user interfaces or the intrusion of malicious versions of the applications replacing the original ones. In this paper, we analyse such risks and present a number of solutions to address them in a client/server-based solution for supporting secure migration of interactive Web applications.

References

[1]
Alt, F., Kubitza, T., Bial, D., et al. Digifieds: insights into deploying digital public notice areas in the wild. Proceedings of MUM'11, ACM Press, pp. 165--174.
[2]
Arthur, R., Olsen, D. R. Privacy-aware shared UI toolkit for nomadic environments. Software -- Practice and Experience, 2011, 42:601--628.
[3]
Chang, T.-H., Li, Y. Deep Shot: a framework for migrating tasks across devices using mobile phone cameras. Proceedings of CHI 2011, ACM, pp. 2163--2172.
[4]
Cross-Origin Resource Sharing. W3C Working Draft 27 July 2010. http://www.w3.org/TR/cors/.
[5]
Ge, X., Paige, R. F., Polack, F. A. C., Chivers, H., Brooke, P. J.: Agile development of secure web applications. Proceedings of ICWE '06, ACM, pp. 305--312.
[6]
Ghiani, G., Paternò, F. Santoro, C. Push and Pull of Web User Interfaces in Multi-Device Environments. Proceedings of AVI 2012, ACM New York, pp. 10--17.
[7]
Kounavis, M., Kang, X., Grewal, K., Eszenyi, M., Gueron, S., Durham, D. Encrypting the internet. SIGCOMM '10, ACM, 2010, pp. 135--146.
[8]
Li, J., Jia, Y., Liu, L., Woa, T. CyberLiveApp: A secure sharing and migration approach for live virtual desktop applications in a cloud environmentFuture Generation Computer Systems, August 2011, Elsevier.
[9]
Liu, A. X., Kovacs, J., Huang, C.-T., Gouda, M. G. A Secure Cookie Protocol for HTTP. Proceedings of ICCCN 2005, IEEE, pp. 333--338.
[10]
Maurer, M., De Luca, A., Stockinger, T. Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization. INTERACT (4) 2011, pp. 44--51
[11]
Org.apache.http.client library, http://hc.apache.org/httpcomponents-client-ga/
[12]
Satoh, F., Tokuda, T. Security Policy Composition for Composite Services. Proceedings of ICWE '08, IEEE, pp. 86--97.
[13]
Sharp, R., Madhavapeddy, A., Want, R., Pering, T. Enhancing Web browsing security on public terminals using mobile composition. Proceedings of MobiSys 2008, ACM, pp. 94--105.
[14]
Sharp, R., Scott, R., Beresford, A. R. Secure Mobile Computing via Public Terminals. Proceedings of Pervasive 2006, Springer-Verlag Berlin, pp. 238--253.
[15]
The New Multi-screen World: Understanding Cross-Platform Consumer Behavior. Google Research Report, 2012. http://services.google.com/fh/files/misc/multiscreenworld_final.pdf
[16]
Yu, W., Li, J., Hu, C., Zhong, L. Muse: A Multimedia Streaming Enabled Remote Interactivity System for Mobile Devices. Proceedings of MUM'11, ACM, pp. 216--225.

Cited By

View all
  • (2022)Understanding Multi-Device Usage Patterns: Physical Device Configurations and Fragmented WorkflowsProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3517702(1-22)Online publication date: 29-Apr-2022
  • (2019)Cross-Device TaxonomyProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300792(1-28)Online publication date: 2-May-2019
  • (2019)Concepts and design space for a better understanding of multi-device user interfacesUniversal Access in the Information Society10.1007/s10209-019-00650-5Online publication date: 4-Apr-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MUM '12: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
December 2012
383 pages
ISBN:9781450318150
DOI:10.1145/2406367
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • University of Duisburg-Essen

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 December 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. migratory interactive Web applications
  2. multi-device environments
  3. security

Qualifiers

  • Research-article

Conference

MUM '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 190 of 465 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Understanding Multi-Device Usage Patterns: Physical Device Configurations and Fragmented WorkflowsProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3517702(1-22)Online publication date: 29-Apr-2022
  • (2019)Cross-Device TaxonomyProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300792(1-28)Online publication date: 2-May-2019
  • (2019)Concepts and design space for a better understanding of multi-device user interfacesUniversal Access in the Information Society10.1007/s10209-019-00650-5Online publication date: 4-Apr-2019
  • (2017)Security in User Interfaces Distributed Amongst Dynamic Sets of Devices and UsersCollaboration Meets Interactive Spaces10.1007/978-3-319-45853-3_16(373-389)Online publication date: 10-Jan-2017
  • (2016)PeepListPervasive and Mobile Computing10.1016/j.pmcj.2015.12.00430:C(71-83)Online publication date: 1-Aug-2016
  • (2013)Evaluating context-aware user interface migration in multi-device environmentsJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-013-0214-76:2(259-277)Online publication date: 3-Dec-2013
  • (2013)Towards Intelligent Migration of User InterfacesProceedings of the 10th International Conference on Mobile Web Information Systems - Volume 809310.1007/978-3-642-40276-0_16(203-217)Online publication date: 26-Aug-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media