Visualizations and Switching Mechanisms for Security Zones

Peter Riedl, Rene Mayrhofer, Koller Phillip, Andreas Möller, Marion Koelle, Matthias Kranz

Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

3 Citations (Scopus)

Abstract

The ongoing evolution of mobile phones to “pocket comput- ers” generated a demand for more and more applications to be ported to the mobile phone. Because a full security assessment for a whole mobile operating system would be prohibitively costly, currently security critical applications can not be implemented. We address this challenge by in- troducing security zones to enable applications with high se- curity demands like driving licenses, health insurance cards, or passports on mobile phones. This zone concept creates the need for visualization of the current zone and a way to switch between zones. In this paper we discuss several possible ways of achieving this.
Original languageEnglish
Title of host publicationProceedings - 11th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2013
PublisherACM Press
Pages278-281
Number of pages4
ISBN (Print)978-1-4503-2106-8
DOIs
Publication statusPublished - 2013
Event11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013) - Vienna, Austria
Duration: 2 Dec 20134 Dec 2013

Publication series

NameACM International Conference Proceeding Series

Conference

Conference11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013)
CountryAustria
CityVienna
Period02.12.201304.12.2013

Keywords

  • Mobile Devices
  • Security Zones
  • Usability

Fingerprint Dive into the research topics of 'Visualizations and Switching Mechanisms for Security Zones'. Together they form a unique fingerprint.

Cite this