Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
SenSay: A Context-Aware Mobile Phone
ISWC '03 Proceedings of the 7th IEEE International Symposium on Wearable Computers
Will your digital butlers betray you?
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Can i borrow your phone?: understanding concerns when sharing mobile phones
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
One user, many hats; and, sometimes, no hat: towards a secure yet usable PDA
SP'04 Proceedings of the 12th international conference on Security Protocols
Mobile context-awareness: capabilities, challenges and applications
Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct
Degrees of sharing: proximate media sharing and messaging by young people in khayelitsha
MobileHCI '12 Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services
Hi-index | 0.00 |
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The Privacy Protection is realized by spheres, which represent the user's context specific need for privacy. That is, users can create any number of spheres and define which services and data are accessible in each sphere. TreasurePhone integrates context information for supporting authentication and activation of spheres by locations and actions. A basic hierarchy is used for determining which location should be activated based on the associated sensor value.