The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shifts individual computing "from being device-centric to information-centric", which create a bridge between operating system-based computing and the more service-oriented approach...
Smartphones are taking over the task of Personal Digital Assistant and becoming pocket computers due to their fully customizable software and personalization in terms of the personal data stored on them. Thus, how to prevent the private and sensitive information from exposing to outside world is necessary to be taken into account. However, current smartphone operating systems support only a single...
Smart phones of today have increasingly sophisticated software. As the feature set grows further, the probability of system security related defects is likely to increase as well. Today, the security of mobile platforms and applications comes under great scrutiny as they are getting widely adopted. It is therefore crucial that code for mobile devices gets well tested and security bugs eliminated where...
M2M, means “Machine to Machine”, including “Machine to Mobile”, “Man to Machine”, etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be significant security vulnerabilities and risks. In addition, in many use cases, it is likely that M2M will be deployed in very large...
Security-by-Contract (S??C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S??C enriched with an automatic trust management infrastructure. Indeed, we enhance the already existing architecture by adding new modules and configurations for contracts managing. At deploy-time, our system decides the run-time configuration depending on the...
Understanding and discussing the security aspects of IT systems during their development is challenging for both domain specialists and IT experts - neglecting this aspect leads to communication problems and, eventually, to less secure systems. An important factor for these challenges is the distribution and variety of basic IT security concepts, attacks, and countermeasures, e.g., in the standard...
Attacks in RFID systems are known to be expressed in output data. As these systems become more widespread, research into detecting attacks in the output data which is produced when RFID components interact will become more important. However, the problem limiting practical research developments in this area has been the availability of output data containing attacks. As the output data is contextualized...
A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a userpsilas typical surrounding environment. Security is a concern when integrating a mobile device with an environment kiosk. In particular,...
Mobile payment (m-payment) received significant attention because it enables an easy payment mechanism and becomes an important complement to traditional payment means. However, m-payment over open devices and networks poses security challenges of a new dimension. Although many researchers address security issues in m-payment, there are still some security problems that are not well resolved, such...
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume a service. We present a secure device management framework (SDMF), designed to securely deliver services to user devices, whilst also hiding (some of) the complexity of security management from users. Key to this framework...
This paper proposes a novel mechanism for protecting sensitive information inside big organisations against unauthorised disclosure by insider or outsider adversaries. Protecting sensitive content from being disclosed to unauthorised parties is a major concern for big enterprises, such as government agencies, banks, clinics and corporations. This paper mainly focuses on preventing insider information...
Millions of people are enjoying the convenience of transferring money and shopping with mobile e-business, but at great risk. Because of the risk, security should be considered a fundamental aspect of e-business system design. Mobile wireless e-business system inherently possesses a higher degree of risk than wired e-business applications, and it requires greater level of security and trust. Special...
Recent evolution of mobile technologies has opened new use possibilities for mobile devices. At the same time information security problems related to mobile devices have gotten more serious. This study investigated a possibility of remotely and securely transferring files between the mobile device and home computer via the Internet, and the information security threats related to this. We constructed...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.