메뉴 건너뛰기




Volumn , Issue , 2008, Pages 3075-3080

Human-in-the-loop: Rethinking security in mobile and pervasive systems

Author keywords

Mobility; Pervasive and ubiquitous systems; Security; Sociability; Usability

Indexed keywords

HUMAN ENGINEERING; SATELLITE OBSERVATORIES; UBIQUITOUS COMPUTING;

EID: 57049108759     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1358628.1358810     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 3
    • 0242708756 scopus 로고    scopus 로고
    • Brostoff, S., and Sasse, M.A. (2001). Safe and sound: a safety-critical approach to security. NSPW, New Mexico, USA, pp. 41-50.
    • Brostoff, S., and Sasse, M.A. (2001). Safe and sound: a safety-critical approach to security. NSPW, New Mexico, USA, pp. 41-50.
  • 9
    • 57049097166 scopus 로고    scopus 로고
    • 2002, Network Security: Private Communication in a Public World, 2nd ed, Prentice-Hall
    • Kaufman, C., Perlman, R., and Speciner M. (2002). Network Security: Private Communication in a Public World, 2nd ed., Prentice-Hall.
    • Kaufman, C.1    Perlman, R.2    Speciner, M.3
  • 10
    • 35248872559 scopus 로고    scopus 로고
    • Validating and Securing Spontaneous Associations between Wireless Devices
    • Proc. 6th Information Security Conference ISC'03, Springer
    • Kindberg, T. & Zhang, K. (2002). Validating and Securing Spontaneous Associations between Wireless Devices. Proc. 6th Information Security Conference (ISC'03), LNCS 2581, Springer, 44-53.
    • (2002) LNCS , vol.2581 , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 11
    • 33745875633 scopus 로고    scopus 로고
    • Building Common Ground for Face to Face Interactions by Sharing Mobile Device Context. Proc. LOCA
    • Dublin, Ireland, Springer
    • Kostakos, V., O'Neill, E., Shahi, A. (2006). Building Common Ground for Face to Face Interactions by Sharing Mobile Device Context. Proc. LOCA 2006, Dublin, Ireland. LNCS 3987, Springer, 222-238.
    • (2006) LNCS , vol.3987 , pp. 222-238
    • Kostakos, V.1    O'Neill, E.2    Shahi, A.3
  • 12
    • 34547684418 scopus 로고    scopus 로고
    • NFC on mobile phones: Issues, lessons and future research. Proc. Percom 2007
    • NY, USA
    • Kostakos, V. and O'Neill, E. (2007). NFC on mobile phones: issues, lessons and future research. Proc. Percom 2007, Pervasive RFID/NFC Technology Workshop (Pertec 2007), NY, USA, 367-370.
    • (2007) Pervasive RFID/NFC Technology Workshop (Pertec , pp. 367-370
    • Kostakos, V.1    O'Neill, E.2
  • 13
    • 38049075710 scopus 로고    scopus 로고
    • Shake well before use: Authentication based on accelerometer data
    • Proc. Pervasive, Springer
    • Mayrhofer R. & Gellersen, H. (2007). Shake well before use: Authentication based on accelerometer data. In Proc. Pervasive 2007, LNCS 4480, Springer, 44-161,
    • (2007) LNCS , vol.4480 , pp. 44-161
    • Mayrhofer, R.1    Gellersen, H.2
  • 15
    • 38049079703 scopus 로고    scopus 로고
    • Reach out and touch: Using NFC and 2D barcodes for service discovery and interaction with mobile devices
    • Proc. Pervasive, Springer
    • O'Neill, E., Thompson, P., Garzonis, S. and Warr, A. (2007). Reach out and touch: using NFC and 2D barcodes for service discovery and interaction with mobile devices. In Proc. Pervasive 2007, LNCS 4480, Springer, 19-36.
    • (2007) LNCS , vol.4480 , pp. 19-36
    • O'Neill, E.1    Thompson, P.2    Garzonis, S.3    Warr, A.4
  • 17
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • Saltzer, J.H. & Schroeder, M.D. (1975). The Protection of Information in Computer Systems. Proc. IEEE, 63(9):1278-1308.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 18
    • 3042740017 scopus 로고    scopus 로고
    • Humans in the Loop
    • Smith, S.W. (2003). Humans in the Loop. IEEE Security & Privacy, 1(3):75-79.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.3 , pp. 75-79
    • Smith, S.W.1
  • 19
    • 33745912365 scopus 로고    scopus 로고
    • Security for Whom? The shifting security assumptions of pervasive computing
    • Proc. Software Security, Theories and Systems, Springer
    • Stajano, F. (2003). Security for Whom? The shifting security assumptions of pervasive computing. Proc. Software Security - Theories and Systems, LNCS 2609, Springer, 16-27.
    • (2003) LNCS , vol.2609 , pp. 16-27
    • Stajano, F.1
  • 20


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.