Design, Realization, and Evaluation of xShare for Impromptu Sharing of Mobile Phones

Cited 4 time in webofscience Cited 0 time in scopus
  • Hit : 345
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLiu, Yunxinko
dc.contributor.authorRahmati, Ahmadko
dc.contributor.authorJang, Hyukjaeko
dc.contributor.authorHuang, Yuanheko
dc.contributor.authorZhong, Linko
dc.contributor.authorZhang, Yongguangko
dc.contributor.authorZhang, Shenshengko
dc.date.accessioned2013-03-08T22:43:20Z-
dc.date.available2013-03-08T22:43:20Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2010-12-
dc.identifier.citationIEEE TRANSACTIONS ON MOBILE COMPUTING, v.9, no.12, pp.1682 - 1696-
dc.identifier.issn1536-1233-
dc.identifier.urihttp://hdl.handle.net/10203/94549-
dc.description.abstractMobile phones are truly personal devices loaded with personal data such as photos, contacts, and call history. Yet it is often necessary or desirable to share our phones with others. This is especially true as mobile phones are integrating features conventionally provided by other dedicated devices, from MP3 players to games consoles. Yet existing phones assume a single user and provide little protection for private data and applications when a phone is shared. That is, when we lend our phones to others, we give away complete access. In this work, we present xShare, a protection solution to address this problem. xShare allows phone owners to rapidly specify what they want to share and place the phone into a restricted mode where only the data and applications intended for sharing can be accessed. We first present two formative user studies and derive the design requirements of xShare. We then offer the design of xShare based on file-level access control. We describe the implementation of xShare on Windows Mobile and report a comprehensive evaluation, including performance measurements, usability, and a one-month field trial.-
dc.languageEnglish-
dc.publisherIEEE COMPUTER SOC-
dc.titleDesign, Realization, and Evaluation of xShare for Impromptu Sharing of Mobile Phones-
dc.typeArticle-
dc.identifier.wosid000282982200003-
dc.identifier.scopusid2-s2.0-78049504194-
dc.type.rimsART-
dc.citation.volume9-
dc.citation.issue12-
dc.citation.beginningpage1682-
dc.citation.endingpage1696-
dc.citation.publicationnameIEEE TRANSACTIONS ON MOBILE COMPUTING-
dc.identifier.doi10.1109/TMC.2010.162-
dc.contributor.nonIdAuthorLiu, Yunxin-
dc.contributor.nonIdAuthorRahmati, Ahmad-
dc.contributor.nonIdAuthorHuang, Yuanhe-
dc.contributor.nonIdAuthorZhong, Lin-
dc.contributor.nonIdAuthorZhang, Yongguang-
dc.contributor.nonIdAuthorZhang, Shensheng-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorMobile phone-
dc.subject.keywordAuthorsharing-
dc.subject.keywordAuthorprivacy-
dc.subject.keywordAuthorvirtualization-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 4 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0