120,644 Hits in 7.5 sec

A Formal Model of Access Control for Mobile Interactive Devices [chapter]

Frédéric Besson, Guillaume Dufay, Thomas Jensen
2006 Lecture Notes in Computer Science  
An operational semantics of the model and a formal definition of what it means for an application to respect the security model is given.  ...  This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary permissions.  ...  Another example is the security architecture for embedded Java on mobile telephones, defined in the Mobile Information Device Profile [14] for Java, which uses interactive querying of the user to grant  ... 
doi:10.1007/11863908_8 fatcat:gkvup67cjjewha4umlcxqbl2lm


2009 International journal on artificial intelligence tools  
The main contribution of this paper is the design and development of an SOA-equipped content delivery system based on a context-driven, access-controlled, profilefavored, and history-maintained (CAPH)  ...  Self-adaptable presentation objects and modules are modeled as universal Web services resources, so that their interactions are formalized into Web services operations for high interoperability.  ...  The access control manager provides a fine-grained access control for various parts of the content based on receiver identity.  ... 
doi:10.1142/s0218213009000081 fatcat:ypybyos7zva2tebyhtr5rfso4q

A Framework for the Analysis of Access Control Models for Interactive Mobile Devices [chapter]

Juan Manuel Crespo, Gustavo Betarte, Carlos Luna
2009 Lecture Notes in Computer Science  
for the controlled access to sensitive resources of the device.  ...  This paper presents a framework, formalized using the proof-assistant Coq, suitable for defining and comparing the access control policies that can be enforced by (variants of) those security models and  ...  Conclusion and Further Work This paper reports work concerning the formal specification and analysis of access control models for interactive mobile devices.  ... 
doi:10.1007/978-3-642-02444-3_4 fatcat:5gpbgo5zhbddthrnjj3hb6wd3q

Formalization of Learning Objects for Image-based Language Learning in Mobile Environments

Oleg Starostenko, Claudia Perez-Lezama, V. Alarcon-Aquino, J. Alfredo Sanchez
2014 Procedia - Social and Behavioral Sciences  
We have focused on the formalization of learning digital resources using the Formal Learning Object Model (FLOM), which describes required components for constructing learning objects, their life cycle  ...  and some approaches for retrieval and visualization of multimedia documents in mobile environments.  ...  Acknowledgements This research has been partly supported by European Grant #247083: Security, Services, Networking and Performance of Next Generation IP-based Multimedia Wireless Networks  ... 
doi:10.1016/j.sbspro.2014.01.864 fatcat:l32ekx7xpba5ndxt44xxg34quu

An overview of mobile assisted language learning: From content delivery to supported collaboration and interaction

Agnes Kukulska-Hulme, Lesley Shield
2008 ReCALL  
A review of publications reporting mobile-assisted language learning (MALL) was undertaken to discover how far mobile devices are being used to support social contact and collaborative learning.  ...  In this paper, the term 'interactive' and its derivatives refer to human-human interaction. 2. Distance and blended learning models may include an online component. 3.  ...  Whilst a number of projects concentrate on creating learning materials for mobile devices, several others are focusing on communication and interaction.  ... 
doi:10.1017/s0958344008000335 fatcat:ex6m6jnswjc5fji6ogzhkqp7re

Pedagogical Requirements for Mobile Learning: A Review on MOBIlearn Task Model

Abdurrahman Jalil, Martin Beer, Paul Crowther
2015 Journal of Interactive Media in Education  
Acknowledgements We would like to acknowledge Sheffield Hallam University for supporting us by providing the facilities for this research.  ...  Wong (2012) has viewed mobile learning as a personal control and ownership of the learning process for learners.  ...  Framing questions for a review We have derived two research questions based on the layers of the task model: (1) what are the learning activities performed and resources accessed by learners in a mobile  ... 
doi:10.5334/jime.ap fatcat:n2lep3vztjb5bixg6ij7bbxw3i

Mobile Cyber-Physical System

Xiping Hu, Jun Cheng, Xitong Li, Wei Tan, Qiang Liu, Zhengguo Sheng
2017 Mobile Information Systems  
In recent years, the capabilities of contemporary mobile devices have been improving a lot.  ...  Furthermore, traffic clustering analysis and corresponding optimized control strategy are presented for the rapid control of base stations.  ...  In recent years, the capabilities of contemporary mobile devices have been improving a lot.  ... 
doi:10.1155/2017/4970290 fatcat:hmgaek7mjfbllkiaudgxclvrku

Trustworthy Opportunistic Access to the Internet of Services [chapter]

Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You
2013 Lecture Notes in Computer Science  
Nowadays web services pervade the network experience of the users. Indeed, most of our activities over the internet consist in accessing remote services and interact with them.  ...  The recent improvement of the computational capabilities of mobile devices, e.g., tablets and smartphones, seriously mitigated the first aspect.  ...  Briefly, the service provider can run formal verification tools, e.g., a model checker, before delivering the mobile code.  ... 
doi:10.1007/978-3-642-36818-9_52 fatcat:a6wqicrzmnb6vokrmubgmwjdmi

Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems

Gustavo Betarte, Carlos Luna
2015 CLEI Electronic Journal  
We first study and compare formally several variants of the security model specified by MIDP to access sensitive resources of a mobile device.  ...  In this work we present a formalization of an idealized model of a hypervisor.  ...  A framework for defining and comparing access control policies In [29] , a security model for interactive mobile devices is put forward which can be grasped as an extension of that of MIDP.  ... 
doi:10.19153/cleiej.18.3.3 fatcat:bljy4otjffap3ex47ti3ovdi3i

QR Cache: Connecting mLearning Practice with Theory

Robert Power
2012 International Conference on Mobile and Contextual Learning  
They also indicate that the RLOs show a strong convergence of the activity types delineated by the FRAME model.  ...  Feedback was solicited from participating students and instructors to demonstrate the desirability of using such RLOs in combination with learners' own mobile devices.  ...  Only two of the seven students reported having ever used a mobile device for formal learning before, but all of the respondents indicated that they would like to do so again either at school or while on  ... 
dblp:conf/mlearn/Power12 fatcat:uiwgev5ajratpngkvnquvcs26q

Next generation networks: Human-aided and privacy-driven

Raphael C.-W. Phan, Jean-Philippe Aumasson
2008 2008 First ITU-T Kaleidoscope Academic Conference - Innovations in NGN: Future Network and Services  
We discuss how these points are inter-related, and then we culminate this paper with a model that allows formal analysis of network privacy, including the tracing of entities.  ...  New generation networks (NGNs) deployed in the next five to ten years will integrate a myriad of underlying network technologies into a common internet protocol (IP) backbone.  ...  Little for editorial comments that improved how this paper turned out. We thank God for His blessings; and for all that was, is, and is to come [Rev 1 :8].  ... 
doi:10.1109/kingn.2008.4542284 fatcat:l4gqhy6pgfd6lglu7rnl2yqbwu

Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations

Carlos Andres Agudelo Serna, Rachelle Bosua, Atif Ahmad, Sean B. Maynard
2018 European Conference on Information Systems  
The use of mobile devices in knowledge-intensive organizations while effective and cost-efficient also pose a challenging management problem.  ...  Second, we present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature.  ...  Although knowledge leakage is driven by the worker in control of the mobile device, there are multiple environmental factors that affect the use of mobile devices for knowledge work.  ... 
dblp:conf/ecis/SernaBAM18 fatcat:4u736o63tbd4toxavrlnu2awzq

Modeling Components and Services of LTE Mobile Communications System

Ishtiaq Ahmed Choudhry, Nazir Ahmad Zafar
2012 International Journal of Communications, Network and System Sciences  
It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services.  ...  Poor service quality, service disconnections due to mobility, seamless handover, handover interruption time and downward compatibility to other Radio Access Networks (RAN) are some of the key issues for  ...  Introduction Long Term Evolution (LTE), a wireless broadband technology, is designed to support roaming Internet use and access via mobiles phones and other such handset devices.  ... 
doi:10.4236/ijcns.2012.512086 fatcat:4du36l2gorfozmkxb3bxubpod4

A New Mobile Learning Model in the Context of the Smart Classrooms Environment: A Holistic Approach

Ahmed Al-Hunaiyyan, Salah Al-Sharhan, Rana Alhajri
2017 International Journal of Interactive Mobile Technologies  
A major reason for these challenges is the lack of an integrated model in a holistic approach of the smart classroom and TEL environment.  ...  This paper introduces a comprehensive mobile learning (m-learning) model in the context of smart classrooms environment as a part of a holistic approach to implement an efficient Technology Enhanced Learning  ...  The accessibility of the mobile devices is another challenge. For successful implementation of m-learning, students and teachers must have an access to mobile devices [51] .  ... 
doi:10.3991/ijim.v11i3.6186 fatcat:h5kmms4blzgyzclxx6ocudxhym

A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network [chapter]

Handan Gül Çalıklı, Ufuk Çağlayan
2005 Lecture Notes in Computer Science  
Due to the existence of mobile devices such as laptops, PDAs and mobile agents, we need a formal language that is capable of defining the concept of mobility.  ...  In this paper, we extend Mob adtl [1] according its refinement methodology to obtain a formal policy specification language for an 802.11 WLAN with enhanced security network.  ...  For instance Mobile Ambients(MA) [6] specifies and enforces access control policies of mobile agents via capability based type system.  ... 
doi:10.1007/11569596_21 fatcat:h75ocuhvfnem3ftwdl5aqq3rum
« Previous Showing results 1 — 15 out of 120,644 results