The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - April-June (2009 vol.8)
pp: 32-39
Alessandra Toninelli , University of Bologna
Rebecca Montanari , University of Bologna
Ora Lassila , Nokia Services
Deepali Khushraj , Nokia, USA
ABSTRACT
Smart phones pose new challenges to usable security. Current means of specifying security policies or preferences for resource sharing are either woefully inadequate or too hard to use. This article presents a policy model approach toward usable security for smart phones. In particular, the approach adopts a semantic-based policy representation to help users' understanding of security policies and to better reflect what users really want. Furthermore, given the special nature of smart phones' usage, social awareness plays an important role. In this regard, the authors present propose a socially-aware policy reasoning model based on the results of a user study.
INDEX TERMS
smart phones, security, smart phone security
CITATION
Alessandra Toninelli, Rebecca Montanari, Ora Lassila, Deepali Khushraj, "What's on Users' Minds? Toward a Usable Smart Phone Security Model", IEEE Pervasive Computing, vol.8, no. 2, pp. 32-39, April-June 2009, doi:10.1109/MPRV.2009.39
REFERENCES
1. D.K. Smetters and R.E. Grinter, "Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications," Proc. Workshop New Security Paradigms (NSPW 2002), ACM Press, 2002, pp. 82–89.
2. IEEE Security &Privacy, special issue on usability and security, vol. 2, no. 5, 2004.
3. IEEE Network, special issue on policy-based networking, vol. 16, no. 2, 2002.
4. IEEE Internet Computing, special issue on useful computer security, vol. 12, no. 3, 2008.
5. D. Balfanz et al., "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," Proc. Network &Distributed Systems Security Symp. (NDSS 2002), The Internet Soc., 2002, pp. 7–19.
6. J. Hong et al., "Guest Editors' Introduction: Security &Privacy," IEEE Pervasive Computing, vol. 6, no. 4, 2007, pp. 15–17.
7. G. Myles, A. Friday, and N. Davies, "Preserving Privacy in Environments with Location-Based Applications," IEEE Pervasive Computing, vol. 2, no. 1, 2003, pp. 56–64.
8. D. Anthony, T. Henderson, and D. Kotz, "Privacy in Location-Aware Computing Environments," IEEE Pervasive Computing, vol. 6, no. 4, 2007, pp. 64–72.
9. J.E. Katz and M. Aakhus eds., Perpetual Contact: Mobile Communication, Private Talk, Public Performance, Cambridge Univ. Press, 2002.
10. A. Khalil, and K. Connelly, "Context-Aware Telephony: Privacy Preferences and Sharing Patterns," Proc. 20th Conf. Computer Supported Cooperative Work (CSCW 2006), ACM Press, 2006, pp. 469–478.
11. S. Voida et al., "Share and Share Alike: Exploring the User Interface Affordances of File Sharing," Proc. Conf. Computer Human Interaction (CHI 2006), ACM Press, 2006, pp. 221–230.
12. A. Toninelli et al., "A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments," Proc. Int'l Semantic Web Conference (ISWC 2006), LNCS 4273, Springer, pp. 473–486.
13. O. Lassila and D. Khushraj, "Contextualizing Applications via Semantic Middleware," Proc. 2nd Int'l Conf. Mobile &Ubiquitous Systems (MobiQuitous 2005), IEEE CS Press, 2005, pp. 183–191.
14. G. Tonti et al., "Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder," Proc. Int'l Semantic Web Conf. (ISWC 2003), LNCS 2870, Springer, 2003, pp. 419–437.
630 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool