Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
SenSay: A Context-Aware Mobile Phone
ISWC '03 Proceedings of the 7th IEEE International Symposium on Wearable Computers
Will your digital butlers betray you?
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
Can i borrow your phone?: understanding concerns when sharing mobile phones
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
One user, many hats; and, sometimes, no hat: towards a secure yet usable PDA
SP'04 Proceedings of the 12th international conference on Security Protocols
An interactive sensemaking framework for mobile visual analytics
Proceedings of the 3rd International Symposium on Visual Information Communication
Spatial co-location for device association: the connected object way
Proceedings of the 2011 international workshop on Networking and object memories for the internet of things
Context-based security: state of the art, open research topics and a case study
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications
Proceedings of the Eighth Symposium on Usable Privacy and Security
Progressive authentication: deciding when to authenticate on mobile phones
Security'12 Proceedings of the 21st USENIX conference on Security symposium
HotSec'12 Proceedings of the 7th USENIX conference on Hot Topics in Security
Too much information!: user attitudes towards smartphone sharing
Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design
Concepts for mobile programming
Proceedings of the 18th ACM conference on Innovation and technology in computer science education
CASA: context-aware scalable authentication
Proceedings of the Ninth Symposium on Usable Privacy and Security
Exploring the design space of graphical passwords on smartphones
Proceedings of the Ninth Symposium on Usable Privacy and Security
Towards application-centric implicit authentication on smartphones
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Due to increased input and output capabilities, mobile phones hold many different kinds of (mostly private) data. The need for finer grained profiles and integrated data security on mobile phones has already been documented extensively (e.g. [1]). However, there are no appropriate concepts and implementations yet to handle and limit access to data on mobile phones. TreasurePhone has been designed to address this specific problem. It protects the users' mobile phone data based on their current context. Privacy protection is realized by spheres, which represent the users' context-specific need for privacy. That is, users can define which data and services are accessible in which sphere. TreasurePhone exploits context information to support authentication and automatic activation of spheres by locations and actions. We conducted a user study with 20 participants to gain insights on how well users accept such a concept. One of the main goals was to find out whether such privacy features are appreciated by the users even though they make interaction slower and might hinder fast access to specific data. Additionally, we showed that integration of context information significantly increases ease-of-use of the system.