Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1613858.1613940acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
research-article

A context-sensitive security model for privacy protection on mobile phones

Published: 15 September 2009 Publication History

Abstract

In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The Privacy Protection is realized by spheres, which represent the user's context specific need for privacy. That is, users can create any number of spheres and define which services and data are accessible in each sphere. TreasurePhone integrates context information for supporting authentication and activation of spheres by locations and actions. A basic hierarchy is used for determining which location should be activated based on the associated sensor value.

References

[1]
A. De Luca and H. Hußmann. Threat Awareness - Social Impacts of Privacy Aware Ubiquitous Computing. In INTER 2007, June 2007.
[2]
X. Jiang, J. I. Hong, and J. A. L. Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In Ubicomp 2002, 2002.
[3]
A. K. Karlson, A. B. Brush, and S. Schechter. Can I Borrow Your Phone? Understanding Concerns When Sharing Mobile Phones. In CHI 2009, April 2009.
[4]
D. Siewiorek, A. Smailagic, J. Furukawa, A. Krause, N. Moraveji, K. Reiger, J. Shaffer, and F. L. Wong. Sensay: a context-aware mobile phone. In ISWC, 2003.
[5]
F. Stajano. One user, many hats; and, sometimes, no hat - towards a secure yet usable pda. In 12th Int. Security Protocols Workshop. Springer-Verlag, 2004.
[6]
F. Stajano. Will your digital butlers betray you? In WPES 2004. ACM, 2004.

Cited By

View all
  • (2017)A Modular Smartphone for LendingProceedings of the 30th Annual ACM Symposium on User Interface Software and Technology10.1145/3126594.3126633(205-215)Online publication date: 20-Oct-2017
  • (2015)Toy Computing BackgroundMobile Services for Toy Computing10.1007/978-3-319-21323-1_2(9-38)Online publication date: 25-Aug-2015
  • (2012)Degrees of sharingProceedings of the 14th international conference on Human-computer interaction with mobile devices and services10.1145/2371574.2371636(403-412)Online publication date: 21-Sep-2012
  • Show More Cited By

Index Terms

  1. A context-sensitive security model for privacy protection on mobile phones

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MobileHCI '09: Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
    September 2009
    473 pages
    ISBN:9781605582818
    DOI:10.1145/1613858

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 September 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data security
    2. mobile phone
    3. privacy

    Qualifiers

    • Research-article

    Conference

    MobileHCI '09

    Acceptance Rates

    MobileHCI '09 Paper Acceptance Rate 23 of 95 submissions, 24%;
    Overall Acceptance Rate 202 of 906 submissions, 22%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)A Modular Smartphone for LendingProceedings of the 30th Annual ACM Symposium on User Interface Software and Technology10.1145/3126594.3126633(205-215)Online publication date: 20-Oct-2017
    • (2015)Toy Computing BackgroundMobile Services for Toy Computing10.1007/978-3-319-21323-1_2(9-38)Online publication date: 25-Aug-2015
    • (2012)Degrees of sharingProceedings of the 14th international conference on Human-computer interaction with mobile devices and services10.1145/2371574.2371636(403-412)Online publication date: 21-Sep-2012
    • (2012)IntroductionMobile Context Awareness10.1007/978-0-85729-625-2_1(1-8)Online publication date: 2012
    • (2010)Mobile context-awarenessProceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct10.1145/1864431.1864508(539-540)Online publication date: 26-Sep-2010

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media