A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure mobile business applications – framework, architecture and implementation
2004
Information Security Technical Report
We present a framework offering solutions for the development of secure mobile business applications that takes into account the need for strong security credentials, e.g. based on smart cards. ...
However, the actual uptake of these technologies is still to come; one hindrance is security of mobile devices and applications. ...
Acknowledgements We would like to thank our partners in the WiTness project for fruitful discussions and contributions to the presented framework. ...
doi:10.1016/s1363-4127(05)70036-4
fatcat:r5chfin2jbchhexv7ft7jshz5q
Android Security Vulnerabilities Due to User Unawareness and Frameworks for Overcoming Those Vulnerabilities
2016
International Journal of Computer Applications
The purpose for this survey paper is to conduct a survey on users to get the information about the security vulnerabilities they are creating unknowingly, bringing forward some security frameworks for ...
And the users of these smart phones, in most cases unaware of different types of threats. ...
CRePE: Context-Related Policy Enforcement for Android [14] This is a context based security system for android. A context can be defined by the status of some variables (e.g. ...
doi:10.5120/ijca2016908649
fatcat:qvbtsxlmqbeqfmowu6eeymjeuy
Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones
2013
International Journal of Computer Applications
Widespread usage of smart phones and its greater in-built functionality have provided portability to perform transaction like shopping, ticket booking and banking transactions on the fly. ...
In this view there is need to define new attack taxonomy and its modeling. This paper presents a novel taxonomy for Context Aware Proactive System (CAPS) in smart phone. ...
Above the framework layer the applications build and user the core security features that help to build secure The Android Application Sandbox, which isolates your app data and code execution from other ...
doi:10.5120/12224-8462
fatcat:6cg6xrrcvjccxelw7ugc27xg4q
Google Android: A Comprehensive Security Assessment
2010
IEEE Security and Privacy
Upon detecting a context involving an active connection to the internal or protected network, the CAAC mechanism can increase the active security measures on the device. ...
Android Security Mechanisms Android is an application execution environment for mobile devices. It includes an operating system, application framework, and core applications. ...
doi:10.1109/msp.2010.2
fatcat:xwh3y4lrxzhytau6zuu5nywqoe
Security, privacy and trust in Internet of Things: The road ahead
2015
Computer Networks
Such requirements include data confidentiality and authentication, access control within the IoT network, privacy and trust among users and things, and the enforcement of security and privacy policies. ...
For example, [23,24] present a framework for IoT based on Public Key Infrastructure (PKI). ...
., on the basis of the type of application or the host in which the application is executed); for achieving such an issue, a fuzzy approach is exploited. ...
doi:10.1016/j.comnet.2014.11.008
fatcat:nk2nml75efgkrj2soewtdpgvv4
Blockchain smart contracts: Applications, challenges, and future trends
2021
Peer-to-Peer Networking and Applications
Based on the findings from the survey, we identify a set of challenges and open issues that need to be addressed in future studies. Finally, we identify future trends. ...
, and enforce automatically the negotiation and agreement among multiple untrustworthy parties. ...
In the healthcare context, medical devices and health care applications have been increasingly adopted by patients. ...
doi:10.1007/s12083-021-01127-0
pmid:33897937
pmcid:PMC8053233
fatcat:uyy2bawvlncz3imq5f3n7jrimm
D2.2 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version
2021
Zenodo
This the second deliverable of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework), T2.4 ...
(Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in manufacturing ...
in the device. The security of data in transit, via: o An encrypted data flow model based on which data from IoT devices will be able to be securely transferred and processed in trusted execution devices ...
doi:10.5281/zenodo.5667012
fatcat:xgzhqfeq6nbwte4h256pntlkau
A Platform for Security Monitoring of Multi-cloud Applications
[chapter]
2018
Lecture Notes in Computer Science
This paper presents a security assurance platform to monitor and control the security in the context of multi-cloud applications. ...
Indeed, this property is a crucial issue in multi cloud-based environments where many aspects need to be faced, including risk management, data privacy and isolation, security-by-design applications, and ...
Acknowledgment The work presented in this paper has been developed in the context of the MUSA EU Horizon 2020 project [1] under grant agreement No 644429. ...
doi:10.1007/978-3-319-74313-4_5
fatcat:4tlxsshluvgwfhwpesuzrokzzy
Anomaly Detection on Android System
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Due to the proliferation of mobile phones in recent years there are many advantages and some disadvantages in smart-phones usage. ...
Many applications like E-commerce, Social media and games get access of user's permission to use some privileges. ...
This uses two sandboxes to restrict security-related activities and commercial folder activities. ...
doi:10.35940/ijitee.a4951.119119
fatcat:wodnfsaxbjctrcnwgur67ofgki
D2.1 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: MVP
2020
Zenodo
This deliverable is the first output of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework ...
), T2.4 (Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in ...
in the device. • The security of data in transit, via: o An encrypted data flow model based on which data from IoT devices will be able to be securely transferred and processed in trusted execution devices ...
doi:10.5281/zenodo.5666952
fatcat:hwa4x5pwnrdqva2tbp4kspnkhi
GDPR Compliance Verification in Internet of Things
2020
IEEE Access
carried out on their (personal) data by smart devices or cloud-hosted services. ...
Three smart contracts are proposed as a practical solution to support automated verification of operations carried out by devices on user data, in accordance with GDPR rules. ...
The gateway hosts multi-containers and micro-service based framework to provide device management, data storage and access control. ...
doi:10.1109/access.2020.3005509
fatcat:lvehnvegpfgubouya672fsf2gu
Middleware and architectures for space-based and situated computing
2011
International Journal of Space-Based and Situated Computing (IJSSC)
Middleware issues for situated computing, embedded devices, autonomic space management, proactive services, context awareness, and smart spaces are tackled as well. ...
The aim is to sustain systems that collect information about contexts and user actions over a period of time and supply it to applications that dynamically adapt to context changes. ...
Acknowledgements The research presented in this paper is supported by national project 'DEPSYS -models and techniques for ensuring reliability, safety, availability and security of large-scale distributess ...
doi:10.1504/ijssc.2011.039106
fatcat:o3x6jis77bdhxl3cm57oah6oye
Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces
2009
International Journal of Fuzzy Logic and Intelligent Systems
In this paper, design of framework architecture of pervasive computing system providing seamless inter space interactions between private and public smart spaces is presented. ...
When they enter a new island of smart space, they will have to setup their devices and service manually to get the same or different services they had at the previous location. ...
The monitoring and enforcement of the module's active security properties precedes application execution, and endures through out the life of the application. ...
doi:10.5391/ijfis.2009.9.3.198
fatcat:7qa2u5ddfzeafats3uj66w4eha
MOSES
2012
Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12
This poses a serious threat to sensitive corporate data. In this paper we present MOSES, a policy-based framework for enforcing software isolation of applications and data on the Android platform. ...
In MOSES, it is possible to define distinct security profiles within a single smartphone. Each security profile is associated with a set of policies that control the access to applications and data. ...
In Paranoid Android security analysis is executed by a trusted remote server, which hosts the replicas of smart phones in virtual environments. ...
doi:10.1145/2295136.2295140
dblp:conf/sacmat/RusselloCCF12
fatcat:znvpui6jfnhbzpp6otcvqhu2xa
Hybrid Clouds for Data-Intensive, 5G-Enabled IoT Applications: An Overview, Key Issues and Relevant Architecture
2019
Sensors
Finally, two use cases in the context of smart cities and mobile health are presented, aimed at showing how the proposed PaaS enables the development of respective IoT applications. ...
Hybrid cloud multi-access edge computing (MEC) deployments have been proposed as efficient means to support Internet of Things (IoT) applications, relying on a plethora of nodes and data. ...
In IoT, billions of devices enable services in environments such as smart city, smart traffic, smart home, smart healthcare and are often hosted in various deployments as it is the case of decentralized ...
doi:10.3390/s19163591
fatcat:qz6md7lbsfhejcrs3e7vqigsnu
« Previous
Showing results 1 — 15 out of 7,646 results