Usable Mobile Security

被引:0
|
作者
Asokan, N. [1 ]
Kuo, Cynthia [1 ]
机构
[1] Nokia Res Ctr, Espoo, Finland
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We make the case for usable mobile security by outlining why usable security in mobile devices is important and why it is hard to achieve. We describe a number of current problems in mobile devices that need usable and secure solutions. Finally, we discuss the characteristics of mobile devices that can actually help in designing usable solutions to mobile security problems.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [31] Eliciting Usable Security Requirements with Misusability Cases
    Faily, Shamal
    Flechais, Ivan
    2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2011, : 339 - 340
  • [32] Usable privacy and security for personal information management
    Karat, CM
    Brodie, C
    Karat, J
    COMMUNICATIONS OF THE ACM, 2006, 49 (01) : 56 - 57
  • [33] How WEIRD is Usable Privacy and Security Research?
    Hasegawa, Ayako A.
    Inoue, Daisuke
    Akiyama, Mitsuaki
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3241 - 3258
  • [34] A Set of Heuristics for Usable Security and User Authentication
    Realpe, Paulo C.
    Collazos, Cesar A.
    Hurtado, Julio
    Granollers, Antoni
    PROCEEDINGS OF THE XVII INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION INTERACCION 2016, 2016,
  • [35] Shouldn't All Security Be Usable? Introduction
    Theofanos, Mary Frances
    Pfleeger, Shari Lawrence
    IEEE SECURITY & PRIVACY, 2011, 9 (02) : 12 - 17
  • [36] Towards Automatic Creation of Usable Security Configuration
    Zhang, Bin
    Al-Shaer, Ehab
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [37] Exploring the meaning of usable security - a literature review
    Lennartsson, Markus
    Kavrestad, Joakim
    Nohlberg, Marcus
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (04) : 647 - 663
  • [38] Red Button and Yellow Button: Usable Security for Lost Security Tokens
    Goldberg, Ian
    Jenkinson, Graeme
    Llewellyn-Jones, David
    Stajano, Frank
    SECURITY PROTOCOLS XXIV, 2017, 10368 : 165 - 171
  • [39] Eight Lightweight Usable Security Principles for Developers
    Gorski, Peter Leo
    Lo Iacono, Luigi
    Smith, Matthew
    IEEE SECURITY & PRIVACY, 2023, 21 (01) : 20 - 26
  • [40] Usable Security Management with Host Identity Protocol
    Karvonen, Kristiina
    Komu, Miika
    Gurtov, Andrei
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 279 - 286