Access Control Is Not Enough: How Owner and Guest Set Limits to Protect Privacy When Sharing Smartphone.
Yun ZhouTao XuAlexander RaakeYanping CaiPublished in: HCI (26) (2016)
Keyphrases
- access control
- data security
- fine grained
- security mechanisms
- data protection
- security policies
- privacy policies
- dynamic access control
- access control models
- access control policies
- privacy preserving
- privacy protection
- database security
- role based access control
- mobile devices
- identity management
- rbac model
- privacy preservation
- security model
- unauthorized access
- database systems
- role based access control model
- web services