Network security: private communication in a public world
Network security: private communication in a public world
Communications of the ACM
Safe and sound: a safety-critical approach to security
Proceedings of the 2001 workshop on New security paradigms
Humans in the Loop: Human-Computer Interaction and Security
IEEE Security and Privacy
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Security and Usability
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Passpet: convenient password management and phishing protection
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
NFC on Mobile Phones: Issues, Lessons and Future Research
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
A second look at the usability of click-based graphical passwords
Proceedings of the 3rd symposium on Usable privacy and security
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Security for whom? the shifting security assumptions of pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Building common ground for face to face interactions by sharing mobile device context
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
PassChords: secure multi-touch authentication for blind people
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Hi-index | 0.00 |
In this paper we argue that pervasive systems introduce human-driven security vulnerabilities that traditional usability design cannot address. We claim that there is a need to understand better the appropriate role of humans in the context of pervasive systems security, and to develop quantifiable and measurable concepts that describe humans and their relationship with our systems. Here, we highlight mobility and sociability as two new sources of security vulnerabilities for pervasive systems, and describe our method for developing quantifiable metrics for these concepts.