Sciweavers

Share
PERVASIVE
2006
Springer

Secure Mobile Computing Via Public Terminals

9 years 10 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals to handle personal data may compromise privacy. We present a system that enables users to access their applications and data securely using a combination of public terminals and a more trusted, personal device. Our system (i) provides users with capabilities to censor the public terminal display, so that it does not show private data; (ii) filters input events coming from the public terminal, so that maliciously injected keyboard/pointer events do not compromise privacy; and (iii) enables users to view personal information and perform data-entry via their personal device. A key feature of our system is that it works with unmodified applications. A prototype implementation of the system has been publicly released for Linux and Windows. The results arising from a pilot usability study based on this implementatio...
Richard Sharp, James Scott, Alastair R. Beresford
Added 14 Dec 2010
Updated 14 Dec 2010
Type Journal
Year 2006
Where PERVASIVE
Authors Richard Sharp, James Scott, Alastair R. Beresford
Comments (0)
books