Filters








10 Hits in 1.8 sec

TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones [chapter]

Julian Seifert, Alexander De Luca, Bettina Conradi, Heinrich Hussmann
2010 Lecture Notes in Computer Science  
So we are proposing a scheme which does not rely on a third party. The most comfortable path to protect our data is to cipher the data in prior and spill the public key to the licensed users.  ...  This scheme facilitates the users to control the lifetime of the data.  ...  Protection of data by the unauthorized destroyed correctly. But he has no idea on whether the users is then applied. data is really destructed.  ... 
doi:10.1007/978-3-642-12654-3_8 fatcat:yo3goazorndbbloap6fcw6a4oi

A context-sensitive security model for privacy protection on mobile phones

Julian Seifert, Alexander De Luca, Bettina Conradi
2009 Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI '09  
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model.  ...  That is, users can create any number of spheres and define which services and data are accessible in each sphere.  ...  This work, which is focusing on data privacy and mobile phones, is suggesting usage profiles that correspond to the different contexts of the user.  ... 
doi:10.1145/1613858.1613940 dblp:conf/mhci/SeifertLC09 fatcat:o6htiugxbncd3i473cgj75t76u

Mobile context-awareness

Tom Lovett, Eamonn O'Neill
2010 Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Ubicomp '10  
Advances in mobile device sensory hardware and the rise of 'virtual' sensors such as web APIs mean that the mobile user is exposed to a vast range of data that can be used for new advanced applications  ...  In addition, the workshop will encourage insights, into the technical and usability challenges in mobile context-awareness, as well as observations on current and future trends in the field.  ...  Privacy applications are also being developed; including the TreasurePhone application [12] that uses a context-sensitive security model for privacy protection on mobile devices.  ... 
doi:10.1145/1864431.1864508 dblp:conf/huc/LovettO10 fatcat:37b4mxutw5frbgfnbqpwmr643e

Progressive Authentication: Deciding When to Authenticate on Mobile Phones

Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos
2012 USENIX Security Symposium  
We built a prototype running on modern phones to demonstrate progressive authentication and used it in a lab study with nine users.  ...  Mobile users are often faced with a trade-off between security and convenience.  ...  Conclusions We presented a novel approach to progressively authenticate (and de-authenticate) users on mobile phones.  ... 
dblp:conf/uss/RivaQSL12 fatcat:slfsawfdpzgkbhmascqbancp44

Goldilocks and thetwomobile devices

Eiji Hayashi, Oriana Riva, Karin Strauss, A. J. Bernheim Brush, Stuart Schechter
2012 Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS '12  
On both phones and tablets, participants wanted roughly half their applications to be available even when their device was locked and half protected by authentication.  ...  Most mobile phones and tablets support only two access control device states: locked and unlocked.  ...  Data sensitivity: Protecting some of the data in an application was another reason given for splitting.  ... 
doi:10.1145/2335356.2335359 dblp:conf/soups/HayashiRSBS12 fatcat:67bk4ktskbco3hzxgdam5bzury

CASA

Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason Hong, Ian Oakley
2013 Proceedings of the Ninth Symposium on Usable Privacy and Security - SOUPS '13  
Furthermore, our participants, including those who do not using any security mechanisms on their phones, were very positive about CASA and amenable to using it on their phones.  ...  Our results suggest that location data has good potential as a passive factor, and that users can reduce up to 68% of active authentications when using an implementation of CASA, compared to always using  ...  Similarly, Seifert et al. proposed TreasurePhones a system that protected information on mobile phones based on a user's location as detected by near field communication technology [33] .  ... 
doi:10.1145/2501604.2501607 dblp:conf/soups/HayashiDAHO13 fatcat:23zkdfwvr5fmnog43zjhzgue4e

Authentication of Smartphone Users Using Behavioral Biometrics [article]

Abdulaziz Alzubaidi, Jugal Kalita
2019 arXiv   pre-print
Smartphones are small in size, so they are easy to handle and to stow and carry in users' pockets or purses. However, mobile devices are also susceptible to various problems.  ...  Due to the size of smart devices, they can be easily lost and may expose details of users' private lives.  ...  Context-sensitive user data protection on mobile phones,” in Pro- 150, no. 6, pp. 395–401, 2003.  ... 
arXiv:1911.04104v1 fatcat:yxx7pagj3ff6rok7zaq3f5psua

Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors [article]

Hilmi Gunes Kayacik, Mike Just, Lynne Baillie, David Aspinall, Nicholas Micallef
2014 arXiv   pre-print
Operating in the background, our data driven technique compares current behaviour with a user profile.  ...  We propose a lightweight, and temporally and spatially aware user behaviour modelling technique for sensor-based authentication.  ...  Hussmann, “Treasurephone: The research leading to these results has received funding Context-sensitive user data protection on mobile phones,” in Proceed- from the People Programme  ... 
arXiv:1410.7743v1 fatcat:5c667ezprvcebaogi5nz7ixhcu

Only play in your comfort zone: interaction methods for improving security awareness on mobile devices

Peter Riedl, Rene Mayrhofer, Andreas Möller, Matthias Kranz, Florian Lettner, Clemens Holzmann, Marion Koelle
2015 Personal and Ubiquitous Computing  
In this paper, we study the concept of security zones as an intermediate layer of compartmentalization on mobile devices.  ...  Each of these security zones is isolated against the other zones and holds a different set of applications and associated user data and may apply different security policies.  ...  One implementation in a mobile enterprise context, for two zones, is the so-called "BlackBerry Balance", enabling users to keep both personal data and business data separated from each other.  ... 
doi:10.1007/s00779-015-0840-5 fatcat:xcn33g2ribcj7m2xchks5nem3u

UniAuth: Building a Human-Centered Identity Management System

Eiji Hayashi
2018
However, today, we are surrounded by many computers and services, and passwords are imposing a growing burden on users.  ...  Then, the smart device can communicate with online services and physical devices to perform tasks related to user authentication on behalf of users. This work consists of three lines of research.  ...  proposed TreasurePhones, a system that protects information on mobile phones based on users' locations as detected by near field communication technology [94] .  ... 
doi:10.1184/r1/6724157 fatcat:q3lftnmzw5b6xosc6su7xz23oe