2009
DOI: 10.1109/mprv.2009.39
|View full text |Cite
|
Sign up to set email alerts
|

What's on Users' Minds? Toward a Usable Smart Phone Security Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 10 publications
0
19
0
Order By: Relevance
“…The possibility of managing the security policies by the users has become steadily more important in the design of security solutions that aim to align the usability to the capacity of maintaining acceptable levels of integrity, reliability and availability in mobile applications (Toninelli et al, 2009). However, security and usability have been rarely integrated in a satisfactory way in the design and in the development of mobile systems (Hong et al, 2007).…”
Section: Analysis Of the Approachesmentioning
confidence: 99%
“…The possibility of managing the security policies by the users has become steadily more important in the design of security solutions that aim to align the usability to the capacity of maintaining acceptable levels of integrity, reliability and availability in mobile applications (Toninelli et al, 2009). However, security and usability have been rarely integrated in a satisfactory way in the design and in the development of mobile systems (Hong et al, 2007).…”
Section: Analysis Of the Approachesmentioning
confidence: 99%
“…Policies are completely decoupled from both the application logic and the KB management, to allow fine-grained and customizable security behavior. Policies allow read/add/remove actions on triples or graphs (i.e., sets of triples) and are modeled based on the socially aware policy model presented in [19]. As a key feature, they define access rules to data based on social information.…”
Section: Controlling Access To Mse Knowledgementioning
confidence: 99%
“…Policies are currently represented as a combination of SPARQL queries and RDF statements. For the sake of conciseness we do not describe the policy model in detail, but refer the reader to [19].…”
Section: Controlling Access To Mse Knowledgementioning
confidence: 99%
“…We use the representational model presented in [10] to specify policies. In particular, a policy is represented as a set of attributes with predetermined values, either constant or variable with constraints over the range of values.…”
Section: A Policy Representation Detailsmentioning
confidence: 99%
“…First, we have designed a novel policy framework for controlling access to social data in mobile applications. The framework is based on the semantic policy model presented in [10] and allows the representation of expressive policies based on users' mobile social ecosystem (MSE), that is, the rich set of social interactions occuring between people in mobile environments, according to various social relationships (e.g., friends, family or co-workers), different activities performed on content (commenting, tagging, etc. ), as well as formation of groups and organization of events.…”
Section: Introductionmentioning
confidence: 99%