Security in User Interfaces Distributed Amongst Dynamic Sets of Devices and Users

Chapter

Abstract

Given the increasing availability of many devices in our daily environments, distributed user interfaces are becoming more and more used. However, they raise many issues related to security, which current frameworks for distributed user interfaces have yet to address adequately. We present a solution for this purpose, able to exploit public key certificates for authentication and encryption as well. The presented solution consists of a reference software architecture for secure distributed user interfaces and a corresponding implementation. We also report on an example application for a city guide supporting collaborative cross-device user interfaces.

Keywords

Multi-device user interfaces Security and privacy in distributed user interfaces 

References

  1. 1.
    Alt F, Kubitza T, Bial D et al Digifieds: insights into deploying digital public notice areas in the wild. In: Proceedings of MUM’11. ACM Press, pp 165–174Google Scholar
  2. 2.
    Arthur R, Olsen DR (2011) Privacy-aware shared UI toolkit for nomadic environments. Softw Pract Exp 42:601–628Google Scholar
  3. 3.
    De Luca A, von Zezschwitz E, Nguyen NDH, Maurer ME, Rubegni E, Scipioni MP, Langheinrich M (2013) Back of device authentication on smartphones. In: Proceedings of CHI’13. ACM PressGoogle Scholar
  4. 4.
    Frosini L, Paternò F User interface distribution in multi-device and multi-user environments with dynamically migrating engines. In: Proceedings of EICS 2014, pp 55–65Google Scholar
  5. 5.
    Ghiani G, Paternò F, Isoni L Security in migratory interactive web applications. In: Proceedings of MUM 2012. ACM, Article 15, 10 pagesGoogle Scholar
  6. 6.
    Heupel M, Bourimi M, Schwarte P, Kesdogan D, Barth T, Villanueva PG (2013) Enhancing the security and usability of dui based collaboration with proof based access control. In distributed user interfaces. Springer, LondonGoogle Scholar
  7. 7.
    Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: MobiSys’04: proceedings of the 2nd international conference on mobile systems, applications, and services. ACM, New York, pp 177–189Google Scholar
  8. 8.
    Nebeling M, Mintsi T, Husmann M, Norrie M Interactive development of cross-device user interfaces. In: Proceedings of CHI 2014. ACM, pp 2793–2802Google Scholar
  9. 9.
    Roesner F, Fogarty J, Kohno T User interface toolkit mechanisms for securing interface elements. In: Proceedings of UIST’12. ACM, pp 239–250Google Scholar
  10. 10.
    Sharp R, Madhavapeddy A, Want R, Pering T Enhancing web browsing security on public terminals using mobile composition. In: Proceedings of MobiSys 2008. ACM, pp 94–105Google Scholar
  11. 11.
    Yang J, Wigdor D (2014) Panelrama: enabling easy specification of cross-device web applications. In: Proceedings of CHI 2014. ACM, pp 2783–2792Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.CNR-ISTIPisaItaly

Personalised recommendations