{"id":"https://openalex.org/W4417025438","doi":"https://doi.org/10.1145/3756884.3766056","title":"Not Just Who You Are, but Where and How: Modeling XR Authentication Scenarios","display_name":"Not Just Who You Are, but Where and How: Modeling XR Authentication Scenarios","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W4417025438","doi":"https://doi.org/10.1145/3756884.3766056"},"language":null,"primary_location":{"id":"doi:10.1145/3756884.3766056","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3756884.3766056","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3756884.3766056","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 31st ACM Symposium on Virtual Reality Software and Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3756884.3766056","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090690337","display_name":"Christina Katsini","orcid":"https://orcid.org/0000-0003-4418-7199"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Christina Katsini","raw_affiliation_strings":["WMG, University of Warwick, Coventry, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0003-4418-7199","affiliations":[{"raw_affiliation_string":"WMG, University of Warwick, Coventry, United Kingdom","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043277300","display_name":"Gregory Epiphaniou","orcid":"https://orcid.org/0000-0003-1054-6368"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gregory Epiphaniou","raw_affiliation_strings":["University of Warwick, Coventry, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0003-1054-6368","affiliations":[{"raw_affiliation_string":"University of Warwick, Coventry, United Kingdom","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080175512","display_name":"Carsten Maple","orcid":"https://orcid.org/0000-0002-4715-212X"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Carsten Maple","raw_affiliation_strings":["WMG, University of Warwick, Coventry, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-4715-212X","affiliations":[{"raw_affiliation_string":"WMG, University of Warwick, Coventry, United Kingdom","institution_ids":["https://openalex.org/I39555362"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090690337"],"corresponding_institution_ids":["https://openalex.org/I39555362"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49756166,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.6887999773025513,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.6887999773025513,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.1340000033378601,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.019999999552965164,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.8725000023841858},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7008000016212463},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5221999883651733},{"id":"https://openalex.org/keywords/chip-authentication-program","display_name":"Chip Authentication Program","score":0.44920000433921814},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4404999911785126},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.4189000129699707},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4036000072956085},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.39329999685287476}],"concepts":[{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.8725000023841858},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7008000016212463},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6322000026702881},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6305999755859375},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5221999883651733},{"id":"https://openalex.org/C142124187","wikidata":"https://www.wikidata.org/wiki/Q5101471","display_name":"Chip Authentication Program","level":5,"score":0.44920000433921814},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4404999911785126},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.4189000129699707},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4036000072956085},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.39329999685287476},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.36629998683929443},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.34450000524520874},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.32260000705718994},{"id":"https://openalex.org/C74196892","wikidata":"https://www.wikidata.org/wiki/Q7781188","display_name":"Thematic analysis","level":3,"score":0.3163999915122986},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.2987000048160553},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2766999900341034},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.2587999999523163},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.25859999656677246},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.2563000023365021}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3756884.3766056","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3756884.3766056","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3756884.3766056","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 31st ACM Symposium on Virtual Reality Software and Technology","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3756884.3766056","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3756884.3766056","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3756884.3766056","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 31st ACM Symposium on Virtual Reality Software and Technology","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320279","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417025438.pdf","grobid_xml":"https://content.openalex.org/works/W4417025438.grobid-xml"},"referenced_works_count":74,"referenced_works":["https://openalex.org/W1438741236","https://openalex.org/W1586237437","https://openalex.org/W2076463985","https://openalex.org/W2129660502","https://openalex.org/W2294497986","https://openalex.org/W2295659545","https://openalex.org/W2335819971","https://openalex.org/W2488752599","https://openalex.org/W2545058543","https://openalex.org/W2549484948","https://openalex.org/W2603092022","https://openalex.org/W2615339033","https://openalex.org/W2735153931","https://openalex.org/W2741095865","https://openalex.org/W2753128398","https://openalex.org/W2783257340","https://openalex.org/W2789713441","https://openalex.org/W2791041118","https://openalex.org/W2791352940","https://openalex.org/W2793827260","https://openalex.org/W2794473242","https://openalex.org/W2903757287","https://openalex.org/W2941915966","https://openalex.org/W2943261448","https://openalex.org/W2943320313","https://openalex.org/W2945933611","https://openalex.org/W2953371218","https://openalex.org/W2992432281","https://openalex.org/W2997309279","https://openalex.org/W2998074822","https://openalex.org/W3008085074","https://openalex.org/W3008902155","https://openalex.org/W3025972484","https://openalex.org/W3027366259","https://openalex.org/W3041874169","https://openalex.org/W3082112937","https://openalex.org/W3085741516","https://openalex.org/W3095948427","https://openalex.org/W3114965367","https://openalex.org/W3120549219","https://openalex.org/W3124751734","https://openalex.org/W3160723273","https://openalex.org/W3161961012","https://openalex.org/W3181056355","https://openalex.org/W4224238047","https://openalex.org/W4224242333","https://openalex.org/W4225145302","https://openalex.org/W4243052856","https://openalex.org/W4250490597","https://openalex.org/W4281778915","https://openalex.org/W4291396031","https://openalex.org/W4292968994","https://openalex.org/W4297156468","https://openalex.org/W4304142421","https://openalex.org/W4313139769","https://openalex.org/W4324007193","https://openalex.org/W4361007346","https://openalex.org/W4380324622","https://openalex.org/W4385080352","https://openalex.org/W4385950525","https://openalex.org/W4387219324","https://openalex.org/W4387298302","https://openalex.org/W4387628558","https://openalex.org/W4391310790","https://openalex.org/W4392249450","https://openalex.org/W4396832168","https://openalex.org/W4399129738","https://openalex.org/W4401753311","https://openalex.org/W4402722020","https://openalex.org/W4404034694","https://openalex.org/W4405181812","https://openalex.org/W4408281293","https://openalex.org/W4409720492","https://openalex.org/W7117463314"],"related_works":[],"abstract_inverted_index":{"Authentication":[0],"in":[1,38,69],"extended":[2],"reality":[3],"(XR)":[4],"presents":[5],"unique":[6],"challenges":[7],"due":[8],"to":[9,76,97],"embodied":[10],"interaction,":[11],"spatial":[12],"immersion,":[13],"and":[14,25,46,73,84,102,114,129],"variable":[15],"environmental":[16,100],"conditions.":[17],"As":[18],"XR":[19,60,87,138],"systems":[20],"become":[21],"more":[22,130],"prevalent,":[23],"secure":[24],"usable":[26],"authentication":[27,61,88,134],"mechanisms":[28,41,135],"are":[29],"critical.":[30],"However,":[31],"current":[32],"research":[33],"often":[34],"overlooks":[35],"the":[36,70,82],"scenarios":[37],"which":[39],"these":[40],"operate,":[42],"limiting":[43],"comparability,":[44],"reproducibility,":[45],"real-world":[47],"applicability.":[48],"This":[49],"paper":[50],"addresses":[51],"this":[52],"gap":[53],"by":[54],"presenting":[55],"a":[56,117,124],"structured":[57],"model":[58,108],"of":[59,86,133],"scenarios.":[62],"We":[63],"conducted":[64],"semi-structured":[65],"interviews":[66],"with":[67],"experts":[68],"Usable":[71],"Security":[72],"Privacy":[74],"domain":[75],"identify":[77],"key":[78],"scenario":[79,107],"dimensions":[80,95],"influencing":[81],"design":[83,128],"evaluation":[85,132],"mechanisms.":[89],"Through":[90],"thematic":[91],"analysis,":[92],"we":[93],"identified":[94],"related":[96],"contextual":[98],"parameters,":[99],"conditions,":[101],"XR-specific":[103],"properties.":[104],"The":[105],"resulting":[106],"was":[109],"validated":[110],"through":[111],"literature":[112],"mapping":[113],"demonstrated":[115],"via":[116],"realistic":[118],"use":[119],"case.":[120],"Our":[121],"work":[122],"provides":[123],"foundation":[125],"for":[126],"context-aware":[127],"rigorous":[131],"across":[136],"diverse":[137],"environments.":[139]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-05T00:00:00"}
