2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing 2012
DOI: 10.1109/socialcom-passat.2012.60
|View full text |Cite
|
Sign up to set email alerts
|

Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 44 publications
(35 citation statements)
references
References 6 publications
0
34
0
1
Order By: Relevance
“…For example, if a user is at a well known location (such as home), quick and easy explicit authentication is used. A similar scheme has been proposed by Gupta et al [20] for context profiling to determine authentication control. However, our work is different from these approaches since in addition to selectively invoking an authentication module based on the type of an application, we aim to delegate implicit authentication tasks to an application and not to the device.…”
Section: Related Workmentioning
confidence: 99%
“…For example, if a user is at a well known location (such as home), quick and easy explicit authentication is used. A similar scheme has been proposed by Gupta et al [20] for context profiling to determine authentication control. However, our work is different from these approaches since in addition to selectively invoking an authentication module based on the type of an application, we aim to delegate implicit authentication tasks to an application and not to the device.…”
Section: Related Workmentioning
confidence: 99%
“…In [12] the authors use a publicly available dataset containing passively collected GPS data, wi-fi and Bluetooth data to build a context profiling framework. The familiarity of the wi-fi and Bluetooth devices at a location are used to estimate the safety of the context.…”
Section: Related Workmentioning
confidence: 99%
“…The concept of using context-profiling for evaluating contexts for security enforcement has been discussed by Gupta et al [4]. Their work focuses on estimating the threat level in a particular context for the purpose of making access control decisions.…”
Section: Related Workmentioning
confidence: 99%