{"id":"https://openalex.org/W2140464265","doi":"https://doi.org/10.1145/1378600.1378623","title":"Trustworthy and personalized computing on public kiosks","display_name":"Trustworthy and personalized computing on public kiosks","publication_year":2008,"publication_date":"2008-06-17","ids":{"openalex":"https://openalex.org/W2140464265","doi":"https://doi.org/10.1145/1378600.1378623","mag":"2140464265"},"language":"en","primary_location":{"id":"doi:10.1145/1378600.1378623","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1378600.1378623","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th international conference on Mobile systems, applications, and services","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080369104","display_name":"Scott Garriss","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Scott Garriss","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA","Carnegie-Mellon University, Pittsburgh, Pa., USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Carnegie-Mellon University, Pittsburgh, Pa., USA#TAB#","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103580206","display_name":"Ram\u00f3n C\u00e1ceres","orcid":null},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R\u00e1mon C\u00e1ceres","raw_affiliation_strings":["AT&amp;T Labs, Florham Park, NJ, USA"],"affiliations":[{"raw_affiliation_string":"AT&amp;T Labs, Florham Park, NJ, USA","institution_ids":["https://openalex.org/I1283103587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073346023","display_name":"Stefan Berger","orcid":"https://orcid.org/0000-0002-0461-2640"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stefan Berger","raw_affiliation_strings":["IBM T. J. Watson Research Center, Hawthorne, NY, USA","IBM T.J. Watson Research Center, Hawthorne, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Hawthorne, NY, USA","institution_ids":["https://openalex.org/I1341412227"]},{"raw_affiliation_string":"IBM T.J. Watson Research Center, Hawthorne, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015743671","display_name":"Reiner Sailer","orcid":null},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reiner Sailer","raw_affiliation_strings":["IBM T. J. Watson Research Center, Hawthorne, NY, USA","IBM T.J. Watson Research Center, Hawthorne, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Hawthorne, NY, USA","institution_ids":["https://openalex.org/I1341412227"]},{"raw_affiliation_string":"IBM T.J. Watson Research Center, Hawthorne, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078540145","display_name":"Leendert van Doorn","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137977","display_name":"Advanced Micro Devices (United States)","ror":"https://ror.org/04kd6c783","country_code":"US","type":"company","lineage":["https://openalex.org/I4210137977"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Leendert van Doorn","raw_affiliation_strings":["AMD, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"AMD, Austin, TX, USA","institution_ids":["https://openalex.org/I4210137977"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100759721","display_name":"Xiaolan Zhang","orcid":"https://orcid.org/0000-0002-6343-3116"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaolan Zhang","raw_affiliation_strings":["IBM T. J. Watson Research Center, Hawthorne, NY, USA","IBM T.J. Watson Research Center, Hawthorne, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Hawthorne, NY, USA","institution_ids":["https://openalex.org/I1341412227"]},{"raw_affiliation_string":"IBM T.J. Watson Research Center, Hawthorne, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5080369104"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":22.2903,"has_fulltext":false,"cited_by_count":91,"citation_normalized_percentile":{"value":0.99454752,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"199","last_page":"210"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interactive-kiosk","display_name":"Interactive kiosk","score":0.9808377623558044},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7401551008224487},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.641309380531311},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5829845070838928},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5315924286842346},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.4729097783565521},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3740546703338623},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.37062907218933105},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.30383890867233276}],"concepts":[{"id":"https://openalex.org/C116865082","wikidata":"https://www.wikidata.org/wiki/Q1370241","display_name":"Interactive kiosk","level":2,"score":0.9808377623558044},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7401551008224487},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.641309380531311},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5829845070838928},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5315924286842346},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.4729097783565521},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3740546703338623},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37062907218933105},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.30383890867233276}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1378600.1378623","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1378600.1378623","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th international conference on Mobile systems, applications, and services","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.141.7867","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.7867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.cmu.edu/~15-821/CDROM/PAPERS/garriss08.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.219.4024","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.4024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.toronto.edu/~delara/courses/csc2228/papers/garriss.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W17439628","https://openalex.org/W148439958","https://openalex.org/W1504669610","https://openalex.org/W1548691389","https://openalex.org/W1562002170","https://openalex.org/W1573569031","https://openalex.org/W1575543897","https://openalex.org/W1596075621","https://openalex.org/W1597801646","https://openalex.org/W1598297854","https://openalex.org/W1719474664","https://openalex.org/W1748095088","https://openalex.org/W1978183200","https://openalex.org/W1998910888","https://openalex.org/W1999067777","https://openalex.org/W2069382570","https://openalex.org/W2085007689","https://openalex.org/W2096938398","https://openalex.org/W2099042427","https://openalex.org/W2100240158","https://openalex.org/W2107722712","https://openalex.org/W2108959037","https://openalex.org/W2111015674","https://openalex.org/W2116897550","https://openalex.org/W2117882778","https://openalex.org/W2126169267","https://openalex.org/W2146034932","https://openalex.org/W2158279289","https://openalex.org/W2164490659","https://openalex.org/W2167804035","https://openalex.org/W2172358039","https://openalex.org/W2561675875","https://openalex.org/W4250874986","https://openalex.org/W6634543181","https://openalex.org/W6637581689","https://openalex.org/W6676262794"],"related_works":["https://openalex.org/W1979435510","https://openalex.org/W1981156044","https://openalex.org/W83923182","https://openalex.org/W1964379023","https://openalex.org/W1986663323","https://openalex.org/W4320806830","https://openalex.org/W2504866173","https://openalex.org/W4206812343","https://openalex.org/W2047471687","https://openalex.org/W1846261222"],"abstract_inverted_index":{"Many":[0],"people":[1],"desire":[2],"ubiquitous":[3],"access":[4],"to":[5,23,34,65,127,151,155,165,182,194],"their":[6],"personal":[7,20],"computing":[8,29,187],"environments.":[9],"We":[10,41,99,158],"present":[11],"a":[12,16,19,27,44,94,117,129,167],"system":[13,75,112],"in":[14,26,63,89,131],"which":[15,47],"user":[17,68,164],"leverages":[18],"mobile":[21,49],"device":[22,50],"establish":[24],"trust":[25,184],"public":[28,186],"device,":[30],"or":[31],"kiosk,":[32,62],"prior":[33],"resuming":[35],"her":[36,171],"environment":[37],"on":[38,60,113,161,185],"the":[39,48,52,61,67,70,82,102,142,152,156,163],"kiosk.":[40],"have":[42,100,159],"designed":[43],"protocol":[45],"by":[46,107,145,169],"determines":[51],"identity":[53],"and":[54,86,109,140],"integrity":[55],"of":[56,97,104,137],"all":[57],"software":[58],"loaded":[59],"order":[64],"inform":[66],"whether":[69],"kiosk":[71,168],"is":[72,149,179],"trustworthy.":[73],"Our":[74],"exploits":[76],"emerging":[77],"hardware":[78],"security":[79],"technologies,":[80],"namely":[81],"Trusted":[83],"Platform":[84],"Module":[85],"new":[87],"support":[88],"x86":[90],"processors":[91],"for":[92,133],"establishing":[93,183],"dynamic":[95],"root":[96],"trust.":[98],"demonstrated":[101],"viability":[103],"our":[105,111,146,177],"approach":[106],"implementing":[108],"evaluating":[110],"commodity":[114],"hardware.":[115],"Through":[116],"brief":[118],"survey,":[119],"we":[120],"found":[121],"that":[122,141],"respondents":[123],"are":[124],"generally":[125,180],"willing":[126],"endure":[128],"delay":[130,143],"exchange":[132],"an":[134],"increased":[135],"assurance":[136],"data":[138],"privacy,":[139],"incurred":[144],"unoptimized":[147],"prototype":[148],"close":[150],"range":[153],"tolerable":[154],"respondents.":[157],"focused":[160],"allowing":[162],"personalize":[166],"running":[170],"own":[172],"virtual":[173],"machine":[174],"there.":[175],"However,":[176],"work":[178],"applicable":[181],"devices":[188],"before":[189],"revealing":[190],"any":[191],"sensitive":[192],"information":[193],"those":[195],"devices.":[196]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":20},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":9}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
