The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Copyright attacks on mobile application is a critical issue for mobile network operators (MNOs) and application and content providers who have deployed AS. This paper proposes a solution for this issue that leverages 3G security architecture. A trusted mobile software runtime is designed to control the execution of the mobile application. A dynamic Software ID and security key are created and deployed...
Military networks are required to adapt their access control policies to the Information Operations Condition (INFOCON) levels to minimize the impact of potential malicious activities. Such adaptations must be automated to the extent possible, consistent with mission requirements, and applied network-wide. In this paper, we present a Policy-Based Network Security (PBNS) management approach for tactical...
In this paper, we propose a security framework, looking at different policies for data access control in the mobile environments. We have started with extending the Platform for Privacy Preferences (P3P) policy for controlling the data access. The aim is to modify the P3P policy and to use it in the security capsule of a mobile handset. The service provider can publish the P3P policy in the WebServices...
Development of advanced mobile internet services requires flexible service platforms. Every service offering needs generic functionalities like security, billing and customer data management. Such functionalities used to be integrated in the mobile network infrastructure but are now offered by competing service platforms. Service platforms can still be offered by operators but can also be embedded...
Wireless sensor networks (WSNs) have many applications in home and industrial automation, and the management and integration of WSNs into Internet and IP-based networks is still getting tremendous interesting. This paper presents a micro SOA-model as part of a 4-layered, SOA-based architecture targeting resource-constrained devices with 48 KB of ROM and 10 KB of RAM. The key idea in this model is...
This paper seeks to integrate different impressive access technologies to build a kind of innovative mobile business model. It analyzes the requirements of mobile business in the age of the 3rd generation wireless communication infrastructure (3G), present a set of mobile business solution in which the second generation ID card in China is used instead of all kinds of the existing IC or ID card for...
The purpose of this project is to allow a free movement of Building Management System (BMS) operator in all controlled building area. The current state of the problem consists in an impossibility of operator's movement from control centre. We found a solution in using of mobile devices like PDA with a client of BMS to allow a remote access to all alarms of system. Solution consist in use of web services...
In the near future, the trend of user-generated content and services currently observable in the Internet domain will also affect the mobile environment: mobile users will become able to easily create content and small services while on the move and offer them to social communities. Mobile users will no longer be pure consumers, they will also become producers and providers of mobile content and services...
The following topics are dealt: cyber engineering; human space computing; distributed networks; security and privacy; heterogeneous wireless networks; resource management; security in wireless systems; web services; web and mobile applications; data models and query processing; performance evaluation and testing; SOA and embedded systems; middleware; cloud computing; RFID; wireless sensor networks;...
Large-scale networked environments, such as the Internet, possess the characteristics of centralised data, centralised access and centralised control; this gives the user a powerful mechanism for building and integrating large repositories of centralised information from diverse resources set. However, a centralised network system with GSM Networks development for a hospital information systems or...
Location-Based Services (LBS) are information and entertainment services, accessible with mobile devices and making use of the position of the mobile device. Although LBS are now widely used, better results could be obtained by merging information issued by several services. Inter-LBS collaboration is still uncommon although a lot of work is done on service orchestration languages such as WS-BPEL...
The Web services technology has been emerged as a set of standards for publishing, discovering, and composing independent services in an open network. While the rapid development in wireless communication technologies is greatly changing the way people access and work with information. Mobile computing system based on Web services now supports advanced methods for application integration through distributed...
Current wireless communications enable people to easily exchange information, while web services provide loosely-coupled and platform-independent ways of linking applications across the Internet or Intranet. This paper presents an integration of wireless communication technologies and web services technologies to realize a wireless food ordering system. In this system, it implements wired and wireless...
A mobile enterprise can be established in a cellular network by participating mobile hosts, which provide Web services from smart phones, and their clients. Mobile hosts enable seamless integration of user-specific services to the enterprise, by following the Web service interfaces and standards, also on the radio link. Moreover, services provided by the mobile host can be integrated with larger enterprise...
The following topics were dealt with: dynamic and declarative business processes; middleware for Web services; advances in quality of service management; mobile technology in enterprise computing systems; security and privacy in enterprise computing; service-oriented business networks and ecosystems; and vocabularies, ontologies and rules for the enterprise.
Traffic security is one of the most important problems to be improved for our daily environment, especially in Japan. Surveillance systems are effectively used to observe intrusion into dangerous and security area. They are well evaluated to monitor whether people enter such an area or not. A remote surveillance system has been developed, which supports users of mobile phones to facilitate network...
The following topics are dealt with: soft computing; security; grid computing ; mobile computing; pervasive computing; image processing; Web services; high performance computing and database management system.
In this paper we present architecture of a middleware layer that enables users of mobile devices to seamlessly and securely access distributed resources in a grid. It lays the ground work for an application toolkit that addresses issues such as delegation of the job to the grid service, interaction with heterogeneous mobile devices, support for online processing, secure communication between the client...
The following topics are dealt with: future information technology; management engineering; artificial intelligence; machine learning; e-business; e-entrepreneurship; e-learning; e-logistics; security and privacy; Web service; grid service; industry management; information system; information economics; database management; and wireless computing.
Based on extensive literature review and qualitative research, we propose the multidimensional and hierarchical model to measure the quality of mobile securities service. In the empirical study, the sample which contains 217 valid respondents is selected from China Mobile and China Unicom. Through three stages validating, all three levels of proposed hierarchical structure are very strongly supported...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.