User-Controllable Security and Privacy for Pervasive Computing

J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor, J. Hong, B. McLaren, M. Reiter, N. Sadeh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

We describe our current work in developing novel mechanisms for managing security and privacy in pervasive computing environments. More specifically, we have developed and evaluated three different applications, including a contextual instant messenger, a people finder application, and a phone-based application for access control. We also draw out some themes we have learned thus far for user-controllable security and privacy.
Original languageEnglish
Title of host publicationMobile Computing Systems and Applications, 2007. HotMobile 2007. Eighth IEEE Workshop on
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages6
ISBN (Print)978-0-7695-3001-7
Publication statusPublished - 1 Mar 2007

Keywords / Materials (for Non-textual outputs)

  • authorisation
  • data privacy
  • mobile computing
  • mobile handsets
  • user interfaces
  • access control
  • contextual instant messenger
  • mobile phone-based application
  • people finder application
  • pervasive computing environment
  • user interface
  • user-controllable privacy
  • user-controllable security
  • Access control
  • Application software
  • Computer security
  • Context-aware services
  • Environmental management
  • Mobile computing
  • Pervasive computing
  • Privacy
  • Smart phones
  • User interfaces


Dive into the research topics of 'User-Controllable Security and Privacy for Pervasive Computing'. Together they form a unique fingerprint.

Cite this