Proceedings of the 11th International Conference on Human-Computer Interaction With Mobile Devices and Services 2009
DOI: 10.1145/1613858.1613940
|View full text |Cite
|
Sign up to set email alerts
|

A context-sensitive security model for privacy protection on mobile phones

Abstract: In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The Privacy Protection is realized by spheres, which represent the user's context specific need for privacy. That is, users can create any number of spheres and define which services and data are accessible in each sphere. TreasurePhone integrates context information for supporting authentication and activation of spheres by locations an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
(4 reference statements)
0
2
0
Order By: Relevance
“…Smartphone use has become mainstream among middle class adults, encouraging media display and sharing and requiring more nuanced models of privacy [11]. Features such as rapid access to 'guest' profiles or sensoractivated spheres have been suggested to support privacy or data security [20], [11]. File-sharing or media 'trafficking' practices support various social interactions [8].…”
Section: Sharing Phonesmentioning
confidence: 99%
“…Smartphone use has become mainstream among middle class adults, encouraging media display and sharing and requiring more nuanced models of privacy [11]. Features such as rapid access to 'guest' profiles or sensoractivated spheres have been suggested to support privacy or data security [20], [11]. File-sharing or media 'trafficking' practices support various social interactions [8].…”
Section: Sharing Phonesmentioning
confidence: 99%
“…To establish relative location, the application uses data on the relative spatial relationships between proximate peers through short range radio sensors. Privacy applications are also being developed; including the TreasurePhone application [12] that uses a context-sensitive security model for privacy protection on mobile devices.…”
Section: Related Workmentioning
confidence: 99%