Filters








12,408 Hits in 7.3 sec

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation [chapter]

Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah
<span title="">2015</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kss7mrolvja63k4rmix3iynkzi" style="color: black;">IFIP Advances in Information and Communication Technology</a> </i> &nbsp;
The dual-execution-environment approach (dual-EE) is a trusted model that was defined to allow mobile smart devices to guarantee tamper-resistant execution for highly sensitive applications.  ...  For instance, we find that bare-metal hypervisors are ill-adapted to provide high assurance security even though they might improve the overall security level of the system.  ...  Authors in [26] evaluate existing hardware security features available on mobile devices for creating tamper-resistant execution.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-18467-8_37">doi:10.1007/978-3-319-18467-8_37</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ptha3ok5ovhrffoec4ghhrrs54">fatcat:ptha3ok5ovhrffoec4ghhrrs54</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170926130318/https://hal.archives-ouvertes.fr/hal-01246353/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c8/83/c883269ce62b99907ad59f04664e4a70e1aa0922.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-18467-8_37"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Evaluation of Security Solutions for Android Systems [article]

Asaf Shabtai, Dudu Mimran, Yuval Elovici
<span title="2015-02-17">2015</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Therefore, there is a need for a methodology to evaluate their effectiveness.  ...  In addition, we present a set of evaluation criteria aiming at evaluating security mechanisms that are specifically designed for Android-based smartphones.  ...  For example, the Inherent Implementation Cost criterion is not relevant when an enterprise is looking to adopt a mobile security solution since the enterprise just adopts a security solution and does not  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1502.04870v1">arXiv:1502.04870v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uubl4boopjaapnxbfvfqnbnoe4">fatcat:uubl4boopjaapnxbfvfqnbnoe4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200825013004/https://arxiv.org/ftp/arxiv/papers/1502/1502.04870.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/80/5580ef407cdfae40e814e453f10b3cfe6904f8d2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1502.04870v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Secure Execution of Java Applets using a Remote Playground [article]

Dahlia Malkhi, Michael Reiter
<span title="1999-08-12">1999</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Mobile code presents a number of threats to machines that execute it.  ...  The paper presents the design and implementation of a playground for Java 1.1 applets, and discusses extensions of it for other forms of mobile code including Java 1.2.  ...  Protecting resources from hostile ActiveX controls by running them remotely on a playground machine should be effective, from a security point of view.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/cs/9908009v1">arXiv:cs/9908009v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ccf2hjayind77e2teeu7aaudx4">fatcat:ccf2hjayind77e2teeu7aaudx4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171008230026/https://core.ac.uk/download/pdf/2424276.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/42/0f/420f41009c2234926fc3677aad7ecb519964f49b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/cs/9908009v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

JavaScript instrumentation for browser security

Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serikov
<span title="2007-01-17">2007</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xu5bk2lj5rbdxlx6222nw7tsxi" style="color: black;">SIGPLAN notices</a> </i> &nbsp;
Untrusted JavaScript code goes through a rewriting process which identifies relevant operations, modifies questionable behaviors, and prompts the user (a web page viewer) for decisions on how to proceed  ...  , yielding a form of self-modifying code.  ...  Acknowledgments We wish to thank Zhong Shao and the anonymous referees for their helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1190215.1190252">doi:10.1145/1190215.1190252</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o43uvmhtufd5dgxnjwrjpomgzq">fatcat:o43uvmhtufd5dgxnjwrjpomgzq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120103131949/http://www.cs.purdue.edu/homes/xyzhang/spring07/Papers/js-tr.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/d3/8cd3d224c935c7065eb806ec0afc47aba4b922a1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1190215.1190252"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

JavaScript instrumentation for browser security

Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serikov
<span title="">2007</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2qaxtqe2rfgjnfefqcokcnzelq" style="color: black;">Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL &#39;07</a> </i> &nbsp;
Untrusted JavaScript code goes through a rewriting process which identifies relevant operations, modifies questionable behaviors, and prompts the user (a web page viewer) for decisions on how to proceed  ...  , yielding a form of self-modifying code.  ...  Acknowledgments We wish to thank Zhong Shao and the anonymous referees for their helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1190216.1190252">doi:10.1145/1190216.1190252</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/popl/YuCIS07.html">dblp:conf/popl/YuCIS07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tkupqlwiprhkpbfnmfwsblfbc4">fatcat:tkupqlwiprhkpbfnmfwsblfbc4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120103131949/http://www.cs.purdue.edu/homes/xyzhang/spring07/Papers/js-tr.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/d3/8cd3d224c935c7065eb806ec0afc47aba4b922a1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1190216.1190252"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Mobile databases

Guy Bernard, Pascal Molli, Philippe Pucheral, Claudia Roncancio, Patricia Serrano-Alvarado, Patrick Valduriez, Jalel Ben-othman, Luc Bouganim, Gérôme Canals, Sophie Chabridon, Bruno Defude, Jean Ferrié (+2 others)
<span title="2004-06-01">2004</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/svqjiw2cwzftpcod3duuxcbveu" style="color: black;">SIGMOD record</a> </i> &nbsp;
This paper reports on the main results of a specific action on mobile databases conducted by CNRS in France from  ...  These properties are used as a correctness criterion for synchronizing data. The transformational approach considers n sites. Each site hosts a local copy of the shared objects.  ...  In this context, queries can be fairly complex and their execution must be confined on the chip to prevent any disclosure of confidential data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1024694.1024708">doi:10.1145/1024694.1024708</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hlc4utswi5f6dkbgdbo4mumk3q">fatcat:hlc4utswi5f6dkbgdbo4mumk3q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190323032018/https://core.ac.uk/download/pdf/51218668.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/f9/7df94ddfcccbf45bb22b79750970ad847d829e53.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1024694.1024708"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Application and programming experience with the Ara mobile agent system

Holger Peine
<span title="">2002</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/afve5b3tavbfzch46mdtazbqla" style="color: black;">Software, Practice &amp; Experience</a> </i> &nbsp;
Usenet research is not a novel application in general, and in fact there are several commercial services offering just this (e.g. deja.com, formerly dejanews.com); it is obvious to ask for how the Falcon  ...  while being a diploma student of the author.  ...  a sound basis for higher level security concepts.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/spe.448">doi:10.1002/spe.448</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oqadnuf2lrczvmw2spmpgfn3iu">fatcat:oqadnuf2lrczvmw2spmpgfn3iu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070624061714/http://wwwagss.informatik.uni-kl.de/Projekte/Ara/Doc/ara-experience.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c0/da/c0dafe153a6c146c17a38b76e2dbdeb985e6e7ed.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/spe.448"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

Extensible security architectures for Java

Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten
<span title="1997-12-01">1997</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/i24hgue5erh4haqtfyyjvfijdu" style="color: black;">ACM SIGOPS Operating Systems Review</a> </i> &nbsp;
Mobile code technologies such as Java, JavaScript, and ActiveX generally limit 911 programs to a single restrictive security policy.  ...  We describe and analyze three implementation strategies for interposing such security policies in softwarebased security systems.  ...  Acknowledgments Thanks to Jim Roskind, Raman Tenneti, and Tom Dell of Netscape for helping us understand their design, and to Netscape for supporting Dan Wallach as a visiting member of the design and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/269005.266668">doi:10.1145/269005.266668</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/embzp2gkzraspp4ypzuymkdhhu">fatcat:embzp2gkzraspp4ypzuymkdhhu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100623232853/http://www.cs.columbia.edu/~nieh/teaching/e6118_s00/papers/p116-wallach.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4b/88/4b8853811d51f4743b9f5f8e2689ea1f325c69e5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/269005.266668"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Extensible security architectures for Java

Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten
<span title="">1997</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jj2vupi7offrtmqekd7qqfaxdm" style="color: black;">Proceedings of the sixteenth ACM symposium on Operating systems principles - SOSP &#39;97</a> </i> &nbsp;
Mobile code technologies such as Java, JavaScript, and ActiveX generally limit 911 programs to a single restrictive security policy.  ...  We describe and analyze three implementation strategies for interposing such security policies in softwarebased security systems.  ...  Acknowledgments Thanks to Jim Roskind, Raman Tenneti, and Tom Dell of Netscape for helping us understand their design, and to Netscape for supporting Dan Wallach as a visiting member of the design and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/268998.266668">doi:10.1145/268998.266668</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sosp/WallachBDF97.html">dblp:conf/sosp/WallachBDF97</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/djstmsw5mrfxhevkkcd6y7woo4">fatcat:djstmsw5mrfxhevkkcd6y7woo4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100623232853/http://www.cs.columbia.edu/~nieh/teaching/e6118_s00/papers/p116-wallach.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4b/88/4b8853811d51f4743b9f5f8e2689ea1f325c69e5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/268998.266668"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Malware comes of age: The arrival of the true computer parasite

Steven Furnell, Jeremy Ward
<span title="">2004</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vowtk7s62rb6hngifi5tau62ie" style="color: black;">Network Security</a> </i> &nbsp;
He has been actively involved in security research for over 12 years, and has authored numerous papers on the topic, as well as the book 'Cybercrime: Vandalizing the Information Society', in which the  ...  Acknowledgements The authors would like to thank Claire Lawrence for her help in collating the virus payload information from DeepSight.  ...  Such traits are valuable in a parasite, in that they help it to meet the second criterion by making it more difficult for the host to destroy.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1353-4858(04)00144-8">doi:10.1016/s1353-4858(04)00144-8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/54v3ihvms5e5lb7qlutlhibav4">fatcat:54v3ihvms5e5lb7qlutlhibav4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130220070437/http://www.net-security.org/dl/articles/malware.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6b/57/6b572335da29dad1243bfa079525df65997ebf92.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1353-4858(04)00144-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Vertical Handoff Decision Strategies in Heterogeneous Wireless Networks

Jyoti Madaan, Indu Kashyap
<span title="2015-06-25">2015</span> <i title="Foundation of Computer Science"> Communications on Applied Electronics </i> &nbsp;
The advancement in wireless networks increases the challenges of mobility management as well the challenges of merging a various number of wireless networks.  ...  Out of those the main challenge for smooth movement is the accessibility of consistent vertical (intersystem) and horizontal (intrasystem) handoff processes.  ...  In Cost function based algorithms, a few parameters, for example, security level are hard to measure, and they degrade their reliability.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/cae-1652">doi:10.5120/cae-1652</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dt66447wqrd7bheknijear7wgu">fatcat:dt66447wqrd7bheknijear7wgu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604035457/https://caeaccess.org/research/volume2/number1/cae-1652.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f8/ce/f8ce9e5b5f8409f209644d645cafb6fa65fdc0fd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/cae-1652"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

SAMI: Service-Based Arbitrated Multi-Tier Infrastructure for Mobile Cloud Computing [article]

Zohreh Sanaei and Saeid Abolfazli and Abdullah Gani and Muhammad Shiraz
<span title="2012-06-27">2012</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We leverage Service Oriented Architecture (SOA) to propose an arbitrated multi-tier infrastructure model named SAMI for MCC.  ...  Mobile Cloud Computing (MCC) is the state-ofthe- art mobile computing technology aims to alleviate resource poverty of mobile devices.  ...  [21] , define the future solutions for MCC. • Long WAN Latency: Latency is a fundamental obstacle that confines MCC solutions to a low-latency approaches.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1206.6219v1">arXiv:1206.6219v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fjkwpuu5wbb3tl3vaga6kw3awq">fatcat:fjkwpuu5wbb3tl3vaga6kw3awq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200901060452/https://arxiv.org/pdf/1206.6219v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ce/03/ce0321a4c6598c041af5625c87ccb5d3430d7db3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1206.6219v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Mobile On-demand Computing: The Future Generation of Cloud

Md. Abdullah Al-Shafi, Ali Newaz Bahar, Sajeeb Saha
<span title="2016-11-30">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/aoxdam2x3rcszlweqkjkp7qcyy" style="color: black;">International Journal of Future Generation Communication and Networking</a> </i> &nbsp;
Mobile cloud computing or on-demand computing is attaining fame among mobile users and mobile devices can use clouds for various exhaustive applications like storage or information processing.  ...  Still, mobile ondemand computing beneath anticipation because of privacy and security perils.  ...  For instance, offloading expends around 5% of a mobile battery for transmission, when the altered code content later compilation is 500 KB and local processing expends around 10% of the battery for transmission  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijfgcn.2016.9.11.15">doi:10.14257/ijfgcn.2016.9.11.15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3756d7b7c5awfh5ybhxrwem7zm">fatcat:3756d7b7c5awfh5ybhxrwem7zm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603221807/http://www.sersc.org/journals/IJFGCN/vol9_no11/15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/85/d88515bdf06cd2412c05923901321832ed75bd04.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijfgcn.2016.9.11.15"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Risk analysis of Android applications: A user-centric solution

Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra
<span title="">2018</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/idqeix2ukbd5fbgjjdkjmaj3ka" style="color: black;">Future generations computer systems</a> </i> &nbsp;
Most of the current security countermeasures for detecting dangerous apps show some weaknesses, mainly related to users' understanding and acceptance.  ...  ., by including code that may threaten user privacy or system integrity.  ...  Currently, 99% of the Android security attacks are brought through infected mobile apps [3] . In particular, in 2014 Android accounted for 97% of all mobile malware [4] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.future.2016.05.035">doi:10.1016/j.future.2016.05.035</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h6x63edt4be37fuolnyc25zzc4">fatcat:h6x63edt4be37fuolnyc25zzc4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722072510/http://spiral.imperial.ac.uk/bitstream/10044/1/38915/2/2016-FGCS-dmmpss-accepted.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/00/34/00341be14912f4a60d66b82514b1f14d64f9322d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.future.2016.05.035"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

An empirical study of cryptographic misuse in android applications

Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel
<span title="">2013</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2013 ACM SIGSAC conference on Computer &amp; communications security - CCS &#39;13</a> </i> &nbsp;
The oracle for all encryption calls returns C b = EK (M b ) to the attacker. 4. The attacker executes steps 2 and 3 q times. 5. The attacker outputs a guess b .  ...  Developers use cryptographic APIs in Android with the intent of securing data such as passwords and personal information on mobile devices.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508859.2516693">doi:10.1145/2508859.2516693</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/EgeleBFK13.html">dblp:conf/ccs/EgeleBFK13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fdfdo5uccjcpphw2goifz55npi">fatcat:fdfdo5uccjcpphw2goifz55npi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812222705/http://www.cs.ucsb.edu/~chris/research/doc/ccs13_cryptolint.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/71/f8/71f8163801980fbaa494cb8c149bd7388034c2ba.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508859.2516693"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 12,408 results