Filters








7,646 Hits in 4.9 sec

Secure mobile business applications – framework, architecture and implementation

Thomas Walter, Laurent Bussard, Yves Roudier, Jochen Haller, Roger Kilian-Kehr, Joachim Posegga, Philip Robinson
2004 Information Security Technical Report  
We present a framework offering solutions for the development of secure mobile business applications that takes into account the need for strong security credentials, e.g. based on smart cards.  ...  However, the actual uptake of these technologies is still to come; one hindrance is security of mobile devices and applications.  ...  Acknowledgements We would like to thank our partners in the WiTness project for fruitful discussions and contributions to the presented framework.  ... 
doi:10.1016/s1363-4127(05)70036-4 fatcat:r5chfin2jbchhexv7ft7jshz5q

Android Security Vulnerabilities Due to User Unawareness and Frameworks for Overcoming Those Vulnerabilities

Tauseef Ibne, Lamia Alam
2016 International Journal of Computer Applications  
The purpose for this survey paper is to conduct a survey on users to get the information about the security vulnerabilities they are creating unknowingly, bringing forward some security frameworks for  ...  And the users of these smart phones, in most cases unaware of different types of threats.  ...  CRePE: Context-Related Policy Enforcement for Android [14] This is a context based security system for android. A context can be defined by the status of some variables (e.g.  ... 
doi:10.5120/ijca2016908649 fatcat:qvbtsxlmqbeqfmowu6eeymjeuy

Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones

Poonam N.Railkar, Parikshit N. Mahalle
2013 International Journal of Computer Applications  
Widespread usage of smart phones and its greater in-built functionality have provided portability to perform transaction like shopping, ticket booking and banking transactions on the fly.  ...  In this view there is need to define new attack taxonomy and its modeling. This paper presents a novel taxonomy for Context Aware Proactive System (CAPS) in smart phone.  ...  Above the framework layer the applications build and user the core security features that help to build secure The Android Application Sandbox, which isolates your app data and code execution from other  ... 
doi:10.5120/12224-8462 fatcat:6cg6xrrcvjccxelw7ugc27xg4q

Google Android: A Comprehensive Security Assessment

A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer
2010 IEEE Security and Privacy  
Upon detecting a context involving an active connection to the internal or protected network, the CAAC mechanism can increase the active security measures on the device.  ...  Android Security Mechanisms Android is an application execution environment for mobile devices. It includes an operating system, application framework, and core applications.  ... 
doi:10.1109/msp.2010.2 fatcat:xwh3y4lrxzhytau6zuu5nywqoe

Security, privacy and trust in Internet of Things: The road ahead

S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini
2015 Computer Networks  
Such requirements include data confidentiality and authentication, access control within the IoT network, privacy and trust among users and things, and the enforcement of security and privacy policies.  ...  For example, [23,24] present a framework for IoT based on Public Key Infrastructure (PKI).  ...  ., on the basis of the type of application or the host in which the application is executed); for achieving such an issue, a fuzzy approach is exploited.  ... 
doi:10.1016/j.comnet.2014.11.008 fatcat:nk2nml75efgkrj2soewtdpgvv4

Blockchain smart contracts: Applications, challenges, and future trends

Shafaq Naheed Khan, Faiza Loukil, Chirine Ghedira-Guegan, Elhadj Benkhelifa, Anoud Bani-Hani
2021 Peer-to-Peer Networking and Applications  
Based on the findings from the survey, we identify a set of challenges and open issues that need to be addressed in future studies. Finally, we identify future trends.  ...  , and enforce automatically the negotiation and agreement among multiple untrustworthy parties.  ...  In the healthcare context, medical devices and health care applications have been increasingly adopted by patients.  ... 
doi:10.1007/s12083-021-01127-0 pmid:33897937 pmcid:PMC8053233 fatcat:uyy2bawvlncz3imq5f3n7jrimm

D2.2 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version

Panagiotis Rizomiliotis, Konstantinos Tserpes, Aikaterini Triakosia
2021 Zenodo  
This the second deliverable of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework), T2.4  ...  (Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in manufacturing  ...  in the device.  The security of data in transit, via: o An encrypted data flow model based on which data from IoT devices will be able to be securely transferred and processed in trusted execution devices  ... 
doi:10.5281/zenodo.5667012 fatcat:xgzhqfeq6nbwte4h256pntlkau

A Platform for Security Monitoring of Multi-cloud Applications [chapter]

Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli
2018 Lecture Notes in Computer Science  
This paper presents a security assurance platform to monitor and control the security in the context of multi-cloud applications.  ...  Indeed, this property is a crucial issue in multi cloud-based environments where many aspects need to be faced, including risk management, data privacy and isolation, security-by-design applications, and  ...  Acknowledgment The work presented in this paper has been developed in the context of the MUSA EU Horizon 2020 project [1] under grant agreement No 644429.  ... 
doi:10.1007/978-3-319-74313-4_5 fatcat:4tlxsshluvgwfhwpesuzrokzzy

Anomaly Detection on Android System

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Due to the proliferation of mobile phones in recent years there are many advantages and some disadvantages in smart-phones usage.  ...  Many applications like E-commerce, Social media and games get access of user's permission to use some privileges.  ...  This uses two sandboxes to restrict security-related activities and commercial folder activities.  ... 
doi:10.35940/ijitee.a4951.119119 fatcat:wodnfsaxbjctrcnwgur67ofgki

D2.1 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: MVP

Miloš Radovanović, Nataša Vujnović Sedlar, Srđan Škrbić
2020 Zenodo  
This deliverable is the first output of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework  ...  ), T2.4 (Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in  ...  in the device. • The security of data in transit, via: o An encrypted data flow model based on which data from IoT devices will be able to be securely transferred and processed in trusted execution devices  ... 
doi:10.5281/zenodo.5666952 fatcat:hwa4x5pwnrdqva2tbp4kspnkhi

GDPR Compliance Verification in Internet of Things

Masoud Barati, Omer Rana, Ioan Petri, George Theodorakopoulos
2020 IEEE Access  
carried out on their (personal) data by smart devices or cloud-hosted services.  ...  Three smart contracts are proposed as a practical solution to support automated verification of operations carried out by devices on user data, in accordance with GDPR rules.  ...  The gateway hosts multi-containers and micro-service based framework to provide device management, data storage and access control.  ... 
doi:10.1109/access.2020.3005509 fatcat:lvehnvegpfgubouya672fsf2gu

Middleware and architectures for space-based and situated computing

Valentin Cristea, Ciprian Dobre, Alexandru Costan, Florin Pop
2011 International Journal of Space-Based and Situated Computing (IJSSC)  
Middleware issues for situated computing, embedded devices, autonomic space management, proactive services, context awareness, and smart spaces are tackled as well.  ...  The aim is to sustain systems that collect information about contexts and user actions over a period of time and supply it to applications that dynamically adapt to context changes.  ...  Acknowledgements The research presented in this paper is supported by national project 'DEPSYS -models and techniques for ensuring reliability, safety, availability and security of large-scale distributess  ... 
doi:10.1504/ijssc.2011.039106 fatcat:o3x6jis77bdhxl3cm57oah6oye

Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces

Shin-Young Lim, Lawrence Chung, Sumi Helal, Hen-I Yang
2009 International Journal of Fuzzy Logic and Intelligent Systems  
In this paper, design of framework architecture of pervasive computing system providing seamless inter space interactions between private and public smart spaces is presented.  ...  When they enter a new island of smart space, they will have to setup their devices and service manually to get the same or different services they had at the previous location.  ...  The monitoring and enforcement of the module's active security properties precedes application execution, and endures through out the life of the application.  ... 
doi:10.5391/ijfis.2009.9.3.198 fatcat:7qa2u5ddfzeafats3uj66w4eha

MOSES

Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes
2012 Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12  
This poses a serious threat to sensitive corporate data. In this paper we present MOSES, a policy-based framework for enforcing software isolation of applications and data on the Android platform.  ...  In MOSES, it is possible to define distinct security profiles within a single smartphone. Each security profile is associated with a set of policies that control the access to applications and data.  ...  In Paranoid Android security analysis is executed by a trusted remote server, which hosts the replicas of smart phones in virtual environments.  ... 
doi:10.1145/2295136.2295140 dblp:conf/sacmat/RusselloCCF12 fatcat:znvpui6jfnhbzpp6otcvqhu2xa

Hybrid Clouds for Data-Intensive, 5G-Enabled IoT Applications: An Overview, Key Issues and Relevant Architecture

Panagiotis Trakadas, Nikolaos Nomikos, Emmanouel T. Michailidis, Theodore Zahariadis, Federico M. Facca, David Breitgand, Stamatia Rizou, Xavi Masip, Panagiotis Gkonis
2019 Sensors  
Finally, two use cases in the context of smart cities and mobile health are presented, aimed at showing how the proposed PaaS enables the development of respective IoT applications.  ...  Hybrid cloud multi-access edge computing (MEC) deployments have been proposed as efficient means to support Internet of Things (IoT) applications, relying on a plethora of nodes and data.  ...  In IoT, billions of devices enable services in environments such as smart city, smart traffic, smart home, smart healthcare and are often hosted in various deployments as it is the case of decentralized  ... 
doi:10.3390/s19163591 fatcat:qz6md7lbsfhejcrs3e7vqigsnu
« Previous Showing results 1 — 15 out of 7,646 results