The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The introduction of bring your own device (BYOD) policy in the corporate world creates benefits for companies as well as job satisfaction for the employee. However, it also creates challenges in terms of security as new vulnerabilities arise. In particular, these challenges include space isolation, data confidentiality, and policy compliance as well as handling the resource constraints of mobile devices...
Recently, potential mobile security incidents will be severe due to the rapid growth of mobile device users. The data leakage threat is a common security threats in mobile environment. To efficiently secure and monitor mobile devices from the threat of data leakage, there are some detection methods and mitigations solutions such as MDM (Mobile Device Management) and MAM (Mobile Application Management)...
Measurement data collected from hardware systems using a mobile application needs to be protected from falling into malicious hands. To circumvent security concerns, many sensitive ATE systems are simply isolated from networks and run in stand-alone environments. Using mobile connections with ATE equipment introduces a whole new level of security issues which can be a large concern for many companies...
The cloud-based solutions can be also applied on e-Health services. To analyze it we have researched several publications about the implementation of some e-Health services based on the Cloud mainly through Medline. In this paper, concepts of Cloud Computing and mobile health records systems are explained. Moreover, the benefits, constraints, issues and requisites of a Mobile Health Record System...
Because of the rapid growth in e-commerce, we can buy things walking around. Its not the expensive items, but the small and cheap items such as text files, music files, movies that we buy while walking around. As this kind of e-commerce grows, micro-payment system develop these days. Since its so convenient, and simple, more and more people use it. Despite its merit, it has some problems to be solved...
Recently, as smartphone is becoming more and more popular, concern about security threats against Mobile Communication Device (MCD) is getting higher. The MCD can not only become the target of the cyber attacks, but also be used as the tool of the cyber attacks. This paper proposes a context-based remote security control scheme for MCD. The proposed scheme consists of two systems: Context-based Mobile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.