Filters








6,358 Hits in 6.0 sec

Tripod of Requirements in Horizontal Heterogeneous Mobile Cloud Computing

Zohreh Sanaei, Saeid Abolfazli, Abdullah Gani, Rashid Hafeez Khokhar
2012 arXiv   pre-print
In this paper, we describe MCC as a horizontal heterogeneous ecosystem and identify thirteen critical metrics and approaches that influence on mobile-cloud solutions and success of MCC.  ...  We divide them into three major classes, namely ubiquity, trust, and energy efficiency and devise a tripod of requirements in MCC.  ...  It is state of the art online mobility with support of integrity and interoperability in contextaware ecosystem that is achievable in convergence of three phenomena as shown in Figure 2 .  ... 
arXiv:1205.3247v1 fatcat:b7zrddxbwrbsdiodxs54of2iva

Actor-based Risk Analysis for Blockchains in Smart Mobility [article]

Ranwa Al Mallah, Bilal Farooq
2020 arXiv   pre-print
We conduct an actor-based analysis to determine the impact of the attacks. The analysis identified five attack goals and five types of attackers that violate the security of the blockchain system.  ...  In the case study of the public permissioned BSMD, we highlight the highest risk factors according to their impact on the victims in terms of monetary, privacy, integrity and trust.  ...  In the first step, we need to identify cyber threat sources (potential a ackers) and their a ack goals in the context of smart mobility data-markets.  ... 
arXiv:2007.09098v1 fatcat:sc7dbeqrlndoznon553zyhmgoa

CAVs Cybersecurity threats digest and analysis

S. Steinhorst, J. Lauinger, N.A. Nijdam, A. Collen, A. Zacharaki, M. Aslam
2019 Zenodo  
research relating to the particular topic of cybersecurity in CAVs, autonomous vehicles, and smart-city infrastructures.Moreover, the limitations of state-of-the-art cybersecurity systems and the constantly  ...  increasing connectivity in all kinds of vehicles will be considered in detail, so as to enable efficient and radical solution to the Cybersecurity on CH with the nIoVe toolkit.  ...  Neghina et al. (2013) has predicted and analysed cyber-attacks in the context of further security violation trends [29]. Meanwhile, E.  ... 
doi:10.5281/zenodo.4728214 fatcat:fonojcfo6fdzbnc7oz6w66zoh4

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
practices in the ecosystem.  ...  CCS Concepts: r Security and privacy → Mobile platform security; Malware and its mitigation; Social aspects of security and privacy Additional  ...  When deploying mitigations for mobile devices, the trade-off between mitigation effectiveness and performance overhead is of particular concern.  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

Beyond the COVID-19 Crisis

Delphine Prady, Herve Tourpe, Sonja Davidovic, Soheib Nunhuck
2020 IMF Working Papers  
Social distancing measures and the large penetration of mobile phones in emerging markets and developing economies (EMDEs) have encouraged government-to-person (G2P) transfers through mobile platforms.  ...  The framework consists of eight building blocks that may help policymakers i) take stock and assess emergency fixes taken to scale up mobile money in a crisis context and ii) develop sustainable long-term  ...  Policymakers and regulators should ensure that risks are identified, managed and mitigated to the extent possible to build trust in G2P programs.  ... 
doi:10.5089/9781513557670.001 fatcat:bb5kw4kytbhm5ft37afrp2to2i

Overtrusting robots: Setting a research agenda to mitigate overtrust in automation

Alexander M. Aroyo, Jan de Bruyne, Orian Dheu, Eduard Fosch-Villaronga, Aleksei Gudkov, Holly Hoch, Steve Jones, Christoph Lutz, Henrik Sætra, Mads Solberg, Aurelia Tamò-Larrieux
2021 Paladyn: Journal of Behavioral Robotics  
Our review mobilizes insights solicited from in-depth conversations from a multidisciplinary workshop on the subject of trust in human–robot interaction (HRI), held at a leading robotics conference in  ...  In this contribution, we offer an overview of pressing topics in the context of overtrust and robots and autonomous systems.  ...  Data availability statement: Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.  ... 
doi:10.1515/pjbr-2021-0029 fatcat:lozo6p3gajcdrje2qeyastxqfu

Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development

Katie Shilton, Daniel Greene
2017 Journal of Business Ethics  
Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem.  ...  For educators, regulators, and managers interested in encouraging more ethical discussion and deliberation in mobile development, these work practices provide a valuable point of entry.  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s10551-017-3504-8 fatcat:lwr5xckasng75auqv4qyrgxvgu

AdAttester

Wenhao Li, Haibo Li, Haibo Chen, Yubin Xia
2015 Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys '15  
With the mobile ad market growing drastically (e.g., from $8.76 billion in 2012 to $17.96 billion in 2013), it is vitally important to provide a verifiable mobile ad framework to detect and prevent ad  ...  AdAttester is non-intrusive to mobile users and can be incrementally deployed in existing ad ecosystem. A prototype of AdAttester is implemented for Android running on a Samsung Exynos 4412 board.  ...  This work is supported in part by a research grant from Huawei Technologies, Inc., the National Natural Science Foundation of China (No. 61303011), the Program for New Century Excellent Talents in University  ... 
doi:10.1145/2742647.2742676 dblp:conf/mobisys/LiLCX15 fatcat:clx6ufpvcncdrapdlmr6k32s4q

Regulatory Safeguards for Accountable Ecosystem Service Markets in Wetlands Development

2014 Kansas Law Review  
L.J. 413, 414 (2001) ("[L]and developers must either purchase credits from specific mitigation banks or pay into 'in-lieu fee' trust funds in order to receive permits to alter wetlands."). 41.  ...  Aug. 23, 2013) (holding that the Corps complied with its regulations by requiring payment by section 404 permit holder to mitigation trust fund under in-lieu fee program); Lisa A.  ... 
doi:10.17161/1808.20261 fatcat:uxq7ww6slrg4hg6b66jwstcya4

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
and networking functions), VNF (security and trust mechanisms in the VI), and IoT (CoAP, EAP and DTLS protocols).  ...  Violations into authorization acts can be mitigated through a secure authentication mechanism.  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

A Case for Personal Virtual Networks

David Choffnes
2016 Proceedings of the 15th ACM Workshop on Hot Topics in Networks - HotNets '16  
, and privacy violations.  ...  Our mobile devices regularly encounter and connect to multiple networks to maintain seamless connectivity.  ...  Because this is difficult to provide on mobile devices themselves, we propose running these mitigation techniques in the network.  ... 
doi:10.1145/3005745.3005753 dblp:conf/hotnets/Choffnes16 fatcat:maezlhtnpjhntbl2idwdq3br7u

From fighting COVID-19 pandemic to tackling sustainable development goals: An opportunity for responsible information systems research

Shan L. Pan, Sixuan Zhang
2020 International Journal of Information Management  
In this essay, we argue that despite its significant damage to human lives and livelihoods, the coronavirus pandemic presents an excellent opportunity for the human family to act in solidarity and turn  ...  In this article, we will highlight the six relevant themes that have evolved during the pandemic and the corresponding topics that future researchers could focus on.  ...  Acknowledgement This research was funded by the National Natural Science Foundation of China grant No. 71901009.  ... 
doi:10.1016/j.ijinfomgt.2020.102196 pmid:32836647 pmcid:PMC7338030 fatcat:ytn5cnoknzavvbn2gcew5kpkry

Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems

Antonio Lima, Francisco Rocha, Marcus Völp, Paulo Esteves-Veríssimo
2016 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy - CPS-SPC '16  
a holistic analysis, under the perspective of fully-fledged ecosystems of autonomous and cooperative vehicles.  ...  We survey paradigms and mechanisms that may be used to overcome or at least mitigate the potential risks that may arise through the several threat vectors analyzed.  ...  Privacy-preserving Design and Architecture Privacy concerns are a serious problem in the ecosystem under consideration because, as we have already mentioned, it handles personally identifiable information  ... 
doi:10.1145/2994487.2994489 dblp:conf/ccs/LimaRVV16 fatcat:kcpquhekv5a55dfscuusxh433y

Cyber-Security Risk Assessment Framework for Blockchains in Smart Mobility

Ranwa Al Mallah, David Lopez, Bilal Farooq
2021 IEEE Open Journal of Intelligent Transportation Systems  
and trust.  ...  Use of distributed ledger technologies like blockchain is becoming more common in transportation/mobility ecosystems.  ...  The attacks will have catastrophic impact on the integrity and trust of the BSMD ecosystem because there will be no belief in the transactions in the ledger.  ... 
doi:10.1109/ojits.2021.3106863 fatcat:c76ydtskrrd5bjumlyspsicu74

SoK: Privacy on Mobile Devices – It's Complicated

Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley, Robert K. Cunningham
2016 Proceedings on Privacy Enhancing Technologies  
Whereas the individual components have been generally well studied and understood, examining the entire mobile device ecosystem provides significant insights into its overwhelming complexity.  ...  Modern mobile devices place a wide variety of sensors and services within the personal space of their users.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the view of DARPA or the National Science Foundation.  ... 
doi:10.1515/popets-2016-0018 dblp:journals/popets/SpenskySYSTHC16 fatcat:2bbk4ionh5hzdm7wlskxzjrg5a
« Previous Showing results 1 — 15 out of 6,358 results