A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Formal Model of Access Control for Mobile Interactive Devices
[chapter]
2006
Lecture Notes in Computer Science
An operational semantics of the model and a formal definition of what it means for an application to respect the security model is given. ...
This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary permissions. ...
Another example is the security architecture for embedded Java on mobile telephones, defined in the Mobile Information Device Profile [14] for Java, which uses interactive querying of the user to grant ...
doi:10.1007/11863908_8
fatcat:gkvup67cjjewha4umlcxqbl2lm
SOA-BASED CONTENT DELIVERY MODEL FOR MOBILE INTERNET NAVIGATION
2009
International journal on artificial intelligence tools
The main contribution of this paper is the design and development of an SOA-equipped content delivery system based on a context-driven, access-controlled, profilefavored, and history-maintained (CAPH) ...
Self-adaptable presentation objects and modules are modeled as universal Web services resources, so that their interactions are formalized into Web services operations for high interoperability. ...
The access control manager provides a fine-grained access control for various parts of the content based on receiver identity. ...
doi:10.1142/s0218213009000081
fatcat:ypybyos7zva2tebyhtr5rfso4q
A Framework for the Analysis of Access Control Models for Interactive Mobile Devices
[chapter]
2009
Lecture Notes in Computer Science
for the controlled access to sensitive resources of the device. ...
This paper presents a framework, formalized using the proof-assistant Coq, suitable for defining and comparing the access control policies that can be enforced by (variants of) those security models and ...
Conclusion and Further Work This paper reports work concerning the formal specification and analysis of access control models for interactive mobile devices. ...
doi:10.1007/978-3-642-02444-3_4
fatcat:5gpbgo5zhbddthrnjj3hb6wd3q
Formalization of Learning Objects for Image-based Language Learning in Mobile Environments
2014
Procedia - Social and Behavioral Sciences
We have focused on the formalization of learning digital resources using the Formal Learning Object Model (FLOM), which describes required components for constructing learning objects, their life cycle ...
and some approaches for retrieval and visualization of multimedia documents in mobile environments. ...
Acknowledgements This research has been partly supported by European Grant #247083: Security, Services, Networking and Performance of Next Generation IP-based Multimedia Wireless Networks ...
doi:10.1016/j.sbspro.2014.01.864
fatcat:l32ekx7xpba5ndxt44xxg34quu
An overview of mobile assisted language learning: From content delivery to supported collaboration and interaction
2008
ReCALL
A review of publications reporting mobile-assisted language learning (MALL) was undertaken to discover how far mobile devices are being used to support social contact and collaborative learning. ...
In this paper, the term 'interactive' and its derivatives refer to human-human interaction. 2. Distance and blended learning models may include an online component. 3. ...
Whilst a number of projects concentrate on creating learning materials for mobile devices, several others are focusing on communication and interaction. ...
doi:10.1017/s0958344008000335
fatcat:ex6m6jnswjc5fji6ogzhkqp7re
Pedagogical Requirements for Mobile Learning: A Review on MOBIlearn Task Model
2015
Journal of Interactive Media in Education
Acknowledgements We would like to acknowledge Sheffield Hallam University for supporting us by providing the facilities for this research. ...
Wong (2012) has viewed mobile learning as a personal control and ownership of the learning process for learners. ...
Framing questions for a review We have derived two research questions based on the layers of the task model: (1) what are the learning activities performed and resources accessed by learners in a mobile ...
doi:10.5334/jime.ap
fatcat:n2lep3vztjb5bixg6ij7bbxw3i
Mobile Cyber-Physical System
2017
Mobile Information Systems
In recent years, the capabilities of contemporary mobile devices have been improving a lot. ...
Furthermore, traffic clustering analysis and corresponding optimized control strategy are presented for the rapid control of base stations. ...
In recent years, the capabilities of contemporary mobile devices have been improving a lot. ...
doi:10.1155/2017/4970290
fatcat:hmgaek7mjfbllkiaudgxclvrku
Trustworthy Opportunistic Access to the Internet of Services
[chapter]
2013
Lecture Notes in Computer Science
Nowadays web services pervade the network experience of the users. Indeed, most of our activities over the internet consist in accessing remote services and interact with them. ...
The recent improvement of the computational capabilities of mobile devices, e.g., tablets and smartphones, seriously mitigated the first aspect. ...
Briefly, the service provider can run formal verification tools, e.g., a model checker, before delivering the mobile code. ...
doi:10.1007/978-3-642-36818-9_52
fatcat:a6wqicrzmnb6vokrmubgmwjdmi
Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems
2015
CLEI Electronic Journal
We first study and compare formally several variants of the security model specified by MIDP to access sensitive resources of a mobile device. ...
In this work we present a formalization of an idealized model of a hypervisor. ...
A framework for defining and comparing access control policies In [29] , a security model for interactive mobile devices is put forward which can be grasped as an extension of that of MIDP. ...
doi:10.19153/cleiej.18.3.3
fatcat:bljy4otjffap3ex47ti3ovdi3i
QR Cache: Connecting mLearning Practice with Theory
2012
International Conference on Mobile and Contextual Learning
They also indicate that the RLOs show a strong convergence of the activity types delineated by the FRAME model. ...
Feedback was solicited from participating students and instructors to demonstrate the desirability of using such RLOs in combination with learners' own mobile devices. ...
Only two of the seven students reported having ever used a mobile device for formal learning before, but all of the respondents indicated that they would like to do so again either at school or while on ...
dblp:conf/mlearn/Power12
fatcat:uiwgev5ajratpngkvnquvcs26q
Next generation networks: Human-aided and privacy-driven
2008
2008 First ITU-T Kaleidoscope Academic Conference - Innovations in NGN: Future Network and Services
We discuss how these points are inter-related, and then we culminate this paper with a model that allows formal analysis of network privacy, including the tracing of entities. ...
New generation networks (NGNs) deployed in the next five to ten years will integrate a myriad of underlying network technologies into a common internet protocol (IP) backbone. ...
Little for editorial comments that improved how this paper turned out. We thank God for His blessings; and for all that was, is, and is to come [Rev 1 :8]. ...
doi:10.1109/kingn.2008.4542284
fatcat:l4gqhy6pgfd6lglu7rnl2yqbwu
Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations
2018
European Conference on Information Systems
The use of mobile devices in knowledge-intensive organizations while effective and cost-efficient also pose a challenging management problem. ...
Second, we present a conceptual framework to explain and categorize the mitigation strategies to combat KLR through the use of mobile devices grounded in the literature. ...
Although knowledge leakage is driven by the worker in control of the mobile device, there are multiple environmental factors that affect the use of mobile devices for knowledge work. ...
dblp:conf/ecis/SernaBAM18
fatcat:4u736o63tbd4toxavrlnu2awzq
Modeling Components and Services of LTE Mobile Communications System
2012
International Journal of Communications, Network and System Sciences
It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. ...
Poor service quality, service disconnections due to mobility, seamless handover, handover interruption time and downward compatibility to other Radio Access Networks (RAN) are some of the key issues for ...
Introduction Long Term Evolution (LTE), a wireless broadband technology, is designed to support roaming Internet use and access via mobiles phones and other such handset devices. ...
doi:10.4236/ijcns.2012.512086
fatcat:4du36l2gorfozmkxb3bxubpod4
A New Mobile Learning Model in the Context of the Smart Classrooms Environment: A Holistic Approach
2017
International Journal of Interactive Mobile Technologies
A major reason for these challenges is the lack of an integrated model in a holistic approach of the smart classroom and TEL environment. ...
This paper introduces a comprehensive mobile learning (m-learning) model in the context of smart classrooms environment as a part of a holistic approach to implement an efficient Technology Enhanced Learning ...
The accessibility of the mobile devices is another challenge. For successful implementation of m-learning, students and teachers must have an access to mobile devices [51] . ...
doi:10.3991/ijim.v11i3.6186
fatcat:h5kmms4blzgyzclxx6ocudxhym
A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network
[chapter]
2005
Lecture Notes in Computer Science
Due to the existence of mobile devices such as laptops, PDAs and mobile agents, we need a formal language that is capable of defining the concept of mobility. ...
In this paper, we extend Mob adtl [1] according its refinement methodology to obtain a formal policy specification language for an 802.11 WLAN with enhanced security network. ...
For instance Mobile Ambients(MA) [6] specifies and enforces access control policies of mobile agents via capability based type system. ...
doi:10.1007/11569596_21
fatcat:h75ocuhvfnem3ftwdl5aqq3rum
« Previous
Showing results 1 — 15 out of 120,644 results