A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Secure mobile business applications – framework, architecture and implementation
2004
Information Security Technical Report
Emerging mobile technologies such as PDAs, laptops and smart phones together with wireless networking technologies such as WLAN and UMTS promise to empower mobile employees to become better integrated into their companies' business processes. However, the actual uptake of these technologies is still to come; one hindrance is security of mobile devices and applications. In this contribution we present an indepth analysis of the current situation enterprises are faced with in the mobile arena,
doi:10.1016/s1363-4127(05)70036-4
fatcat:r5chfin2jbchhexv7ft7jshz5q