Filters








41,569 Hits in 5.1 sec

A Distributed Access Control Model for Java [chapter]

Refik Molva, Yves Roudier
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We suggest a new access control model for mobile code that copes with the shortcomings of the current access control model of Java.  ...  This new model is based on two key enhancements: the association of access control information with each mobile code segment in the form of attributes and the introduction of intermediate elements in the  ...  the runtime environment; -intermediate access control elements that allow for the independent configuration of access control attributes accompanying the mobile programs and access control information  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/10722599_18">doi:10.1007/10722599_18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lvaaf5lfrrhafispc44zeg5tpq">fatcat:lvaaf5lfrrhafispc44zeg5tpq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200326150723/https://link.springer.com/content/pdf/10.1007%2F10722599_18.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d3/f0/d3f07e84a01591caebbdba19e0c26f50ca61887e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/10722599_18"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing [chapter]

Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
For this purpose, a "mobile policy" is defined by the mobile code originator, and is enforced by the runtime environment in a remote host to control which users can run the mobile code and what kind of  ...  The main difference between our approach and existing runtime security models is that the policies enforced in our model are intended to protect the resources of the mobile applications instead of the  ...  be automated and flexible, while administratorinvolved configuration for individual platforms is burdensome for an organization; (2) extensibility and scalability of access control policy for a mobile  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11908739_13">doi:10.1007/11908739_13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2z4ynqurqbh5ncm2fecpbmednm">fatcat:2z4ynqurqbh5ncm2fecpbmednm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20081031170603/http://www.list.gmu.edu/confrnc/misconf/iwsec06.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e8/83/e88378ce8d0a374774ce969c8ad700cdfbe3f59e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11908739_13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Enhanced IoT security through orchestrated policy enforcement gateways

Hamza Attak, Ludovic Jacquin, Andrian L. Shaw, Marco Casassa-Mont, Yolanta Beresna
<span title="2016-11-21">2016</span> <i title="Zenodo"> Zenodo </i> &nbsp;
First, the SECURED architecture for the network edge device (NED) is detailed: its components, security policy refinement and translation, and the way it addresses mobility of the things.  ...  Then, the SHIELD architecture proposes to extend and strengthen the security of the IoT devices by leveraging the dynamic deployment of security controls with analytics, which permits orchestrated security  ...  by the European Commission under the call "Digital security: cybersecurity, privacy and trust" of the H2020 program (grant agreement no. 700199).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3264906">doi:10.5281/zenodo.3264906</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/okhnsl2xwbdbflj2ynp7j4g6by">fatcat:okhnsl2xwbdbflj2ynp7j4g6by</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200212025016/https://zenodo.org/record/3264907/files/CESAR2016_FINAL_full_paper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/36/cb/36cbcfbe6bee943d96293460e33776444ab8dfc2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3264906"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Reducing Attack Surface on Cordova-based Hybrid Mobile Apps

Mohamed Shehab, Abeer AlJarrah
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6y3m32grtnfktkp2oo6oqjbvta" style="color: black;">Proceedings of the 2nd International Workshop on Mobile Development Lifecycle - MobileDeLi &#39;14</a> </i> &nbsp;
Apache Cordova library is an example of a middle-ware that enables developers of different mobile operating systems to access mobile native features through web frameworks, such as HTML and JavaScript,  ...  Hybrid mobile application development is increasingly being adopted by the mobile development community since it provides the answer to the challenge of having the right mix of accessibility to mobile  ...  Acknowledgments This research was partially supported by grants from the National Science Foundation (NSF-CNS-0831360, NSF-CNS-1117411) and a Google Research Award.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2688412.2688417">doi:10.1145/2688412.2688417</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/oopsla/ShehabJ14.html">dblp:conf/oopsla/ShehabJ14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4nwjtjngxbdxbc5wedv74opy3i">fatcat:4nwjtjngxbdxbc5wedv74opy3i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218082924/https://static.aminer.org/pdf/20170130/pdfs/oopsla/gqsfvooycbn9shuxktvedqfc6nap1tmk.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a8/b9/a8b9069d14ead590bfe2dad37b4ef946f194a6ca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2688412.2688417"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Policy-based mobile ad hoc network management

R. Chadha, Hong Cheng, Yuu-Heng Cheng, J. Chiang, A. Ghetie, G. Levin, H. Tanna
<span title="">2004</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/45zgif56bbfphfwdqddvzz4oki" style="color: black;">Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004.</a> </i> &nbsp;
Strict requirements on security and reliability combined with the dynamic nature of the network provide a strong motivation for self-forming, self-configuring, and selfhealing capabilities in the network  ...  Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over wireless links that are susceptible to failure.  ...  changed by external software components, and for accessing the CMDB on behalf of these components.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/policy.2004.1309148">doi:10.1109/policy.2004.1309148</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/policy/ChadhaCCCGLT04.html">dblp:conf/policy/ChadhaCCCGLT04</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jarmr7gi3rgvzlycs26g6aye6y">fatcat:jarmr7gi3rgvzlycs26g6aye6y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20061027123355/http://govt.argreenhouse.com:80/drama/papers/DRAMA_Policy-2004.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/46/cd/46cd013cda8017491ed9665467df5fbe09c8946a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/policy.2004.1309148"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

IP Radio Resource Control System [chapter]

John Vicente, Andrew T. Campbell
<span title="">2001</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The proposed solution leverages network programmability [1], multiple timescales, feedback-based mechanisms across flows, mobile clients and a centralized RAN or LAN control point to configure QOS policies  ...  With the need for mobility and wireless communications now being motivated by the commercial sector, more attention must be given towards IP QOS in the wireless infrastructure, if existing or emerging  ...  In either case, it is the spirit of this work to provide an 'auto-pilot' solution for automating resource control with dynamic provisioning in the face of a highly dynamic, mobile and time-varying wireless  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45508-6_4">doi:10.1007/3-540-45508-6_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k7ovjzsoqzcwbnoug5ukjiba6u">fatcat:k7ovjzsoqzcwbnoug5ukjiba6u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20041023063331/http://www.mnlab.cs.depaul.edu:80/mmns2001/proceeding/22160043.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ad/c8/adc88dee368bf2ddd3b39bb787bd107544340709.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45508-6_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Active security support for active networks

Zhaoyu Liu, R.H. Campbell, M.D. Mickunas
<span title="">2003</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yppgahlq6ndebeq5yvdc23slyy" style="color: black;">IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)</a> </i> &nbsp;
Index Terms-Active access control, active capability, active networks, active security guardian, quality of protection (QoP), security API.  ...  This paper presents a design and a description of the implementation for securing the node of an active network using active networking principles.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their helpful and constructive comments to improve the presentation of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tsmcc.2003.818498">doi:10.1109/tsmcc.2003.818498</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/36zrevdngbhf5i7ikfzl7cok24">fatcat:36zrevdngbhf5i7ikfzl7cok24</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20050217112517/http://www.sis.uncc.edu:80/~zhliu/Research/Papers/smc.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fc/9a/fc9a152de5f352506acdd9ffe5ae3a5769473827.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tsmcc.2003.818498"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

COSMOS: A Context-Centric Access Control Middleware for Mobile Environments [chapter]

Paolo Bellavista, Rebecca Montanari, Daniela Tibaldi
<span title="">2003</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The paper presents the design and implementation of a context-centric access control middleware, called COSMOS, for the wireless Internet.  ...  COSMOS dynamically determines the contexts of mobile proxies, and effectively rules the access to them, by taking into account different types of metadata (user profiles and system/user-level authorization  ...  Finally, we are integrating COSMOS with mechanisms for inter-cell mobility prediction based on IEEE 802.11 signal strength variations, in order to anticipate the migration of (copies of) shadow proxies  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-39646-8_8">doi:10.1007/978-3-540-39646-8_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vkzcmbdgbja43fgo2gno33ph4y">fatcat:vkzcmbdgbja43fgo2gno33ph4y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321173147/http://zeus.ws.dei.polimi.it/is-manet/Documenti/pap-deis-16.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2c/61/2c611052c2bd434f7b6f0246a9940f51dbba23ca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-39646-8_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

User Privacy and Data Flow Control for Android Apps: Systematic Literature Review

Zainab Rashid Alkindi, Mohamed Sarrab, Nasser Alzeidi
<span title="2021-03-23">2021</span> <i title="River Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7fvtrv6o65gszpj46refzq3jw4" style="color: black;">Journal of Cyber Security and Mobility</a> </i> &nbsp;
Android mobile apps gain access to numerous users' private data. Users of different Android mobile apps have less control over their sensitive data during their installation and run-time.  ...  Our thorough examination of the relevant literature has led to a critical analysis of the proposed solutions with a focus on user privacy extensions and mechanism for the Android mobile platform.  ...  Constroid provides partial enforcement of fine-grained and allows users to control the access to policies in Android.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jcsm2245-1439.1019">doi:10.13052/jcsm2245-1439.1019</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ztxz4fikrnax3lxiuvir22dvdm">fatcat:ztxz4fikrnax3lxiuvir22dvdm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210409052020/https://journals.riverpublishers.com/index.php/JCSANDM/article/download/5925/5561" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/88/e7880abbc6cfc0f6d5b96090d27f2744082965cd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jcsm2245-1439.1019"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Security Enforcement Model for Distributed Usage Control

Xinwen Zhang, Jean-Pierre Seifert, Ravi Sandhu
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vhz67i7ervharbc3bpo2kido2q" style="color: black;">2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)</a> </i> &nbsp;
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous access control in dynamic  ...  In this paper we identify the general requirements of a trusted usage control enforcement in heterogeneous computing environments, and then propose a general platform architecture and enforcement mechanism  ...  to all mandatory components for policy enforcement.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sutc.2008.79">doi:10.1109/sutc.2008.79</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sutc/ZhangSS08.html">dblp:conf/sutc/ZhangSS08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xwq4nz5bundjnlgolbvlph7t2i">fatcat:xwq4nz5bundjnlgolbvlph7t2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110401184242/http://profsandhu.com/confrnc/misconf/sutc08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/15/17/151744b6a1832f145c8b8a315098502cf6315ba5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sutc.2008.79"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

DefDroid: Securing Android with Fine-Grained Security Policy

Chao Huang, Shuohong Wang, Haiyang Sun, Zhengwei Qi
<span title="2015-07-01">2015</span> <i title="KSI Research Inc. and Knowledge Systems Institute Graduate School"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tmv5k3vzsffn7oepnliq7vwghq" style="color: black;">Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering</a> </i> &nbsp;
In this paper, we present DefDroid, a repackaging tool for enforcing security policies by modifying Android applications without root privilege.  ...  The main advantages of DefDroid are that it provides a user-friendly interface to configure fine-grained policies and it supplies multiple deployment methods.  ...  However, considering the protection of sensitive information that DefDroid provides, the performance reduction can be tolerated. VII. ACKNOWLEDGMENT  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18293/seke2015-162">doi:10.18293/seke2015-162</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/seke/HuangWSQ15.html">dblp:conf/seke/HuangWSQ15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yem5zadw5jdujak6hz2urkqfye">fatcat:yem5zadw5jdujak6hz2urkqfye</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603000229/http://ksiresearchorg.ipage.com/seke/seke15paper/seke15paper_162.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/09/17/0917d4ef064dbb08306e4207a6a4116f06a278f1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18293/seke2015-162"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure mobile business applications – framework, architecture and implementation

Thomas Walter, Laurent Bussard, Yves Roudier, Jochen Haller, Roger Kilian-Kehr, Joachim Posegga, Philip Robinson
<span title="">2004</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/loqvvym7nfg6vl2gjk5qikd3ie" style="color: black;">Information Security Technical Report</a> </i> &nbsp;
Security management instruments in the form of enforceable enterprise policies are defined which target the security and trust-related deployment and configuration of mobile devices and business applications  ...  This framework consists of software and abstractions that allow for the separation of the core business logic from the security logic in applications.  ...  Acknowledgements We would like to thank our partners in the WiTness project for fruitful discussions and contributions to the presented framework.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1363-4127(05)70036-4">doi:10.1016/s1363-4127(05)70036-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r5chfin2jbchhexv7ft7jshz5q">fatcat:r5chfin2jbchhexv7ft7jshz5q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809014706/https://web.sec.uni-passau.de/papers/ISTR0904p06_21.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/9c/cd9c6be968e331fc23349fc353d521618277fe4d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1363-4127(05)70036-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms [chapter]

Xinwen Zhang, Onur Acıiçmez, Jean-Pierre Seifert
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jajl7qtqc5cy7oavratsldrv2y" style="color: black;">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</a> </i> &nbsp;
In this paper we propose a simple and efficient solution for this problem by considering the unique features of mobile phone devices.  ...  Integrity measurement and attestation mechanisms have already been developed for PC and server platforms, however, porting these technologies directly on mobile and resource-limited devices does not truly  ...  On the other hand, frameworks control the access and usage of hardware resources on mobile phone devices.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-04434-2_7">doi:10.1007/978-3-642-04434-2_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lxv7543fobes7o4pjmxwzu4scy">fatcat:lxv7543fobes7o4pjmxwzu4scy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100627085831/http://www.list.gmu.edu/zhang/pub/mobisec09-attest.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/ca/66ca9315797ff7e159ba8d3143f53b3f4ec12640.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-04434-2_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Network Access Control Technology—Proposition to Contain New Security Challenges

Abdelmajid Lakbabi, Ghizlane Orhanou, Said El Hajji
<span title="">2012</span> <i title="Scientific Research Publishing, Inc,"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fakky7235zh5hdho2lhzhjrw5e" style="color: black;">International Journal of Communications, Network and System Sciences</a> </i> &nbsp;
Point), playing an orchestration role as a central point of control.  ...  To achieve this objective, we will analyze a real-world security platform, and focus on some key components Like, NAC, Firewall, and IPS/IDS then study their interaction in the perspective to propose a  ...  This feature enables NAC solutions to leverage other security products, like IPS/IDS, as part of the access control deployment, for dynamic threat management, bringing visibility and security enforcement  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/ijcns.2012.58061">doi:10.4236/ijcns.2012.58061</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qfjpdy436zbabgzv4yvjwbxqn4">fatcat:qfjpdy436zbabgzv4yvjwbxqn4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923115503/http://file.scirp.org/pdf/IJCNS20120800007_23430945.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/99/53/995345b99b33495a153b40cf98931ef12dfad559.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/ijcns.2012.58061"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Data Confidentiality in Mobile Ad hoc Networks

Hamza Aldabbas
<span title="2012-02-29">2012</span> <i title="Academy and Industry Research Collaboration Center (AIRCC)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jahwaapkvdi5itnn4zhyy4dha" style="color: black;">International Journal of Wireless &amp; Mobile Networks</a> </i> &nbsp;
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.  ...  For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.  ...  There are many techniques that can be used for access control such as Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role Based Access Control (RBAC). 3.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5121/ijwmn.2012.4117">doi:10.5121/ijwmn.2012.4117</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nvqtdaz6vzesrix7dregaomtli">fatcat:nvqtdaz6vzesrix7dregaomtli</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171118084556/https://core.ac.uk/download/pdf/2750996.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2a/19/2a191249d2060108f73dae01c768f1140829cd41.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5121/ijwmn.2012.4117"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 41,569 results