The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral...
HTML5 mobile apps are subject to code injection attacks in which malicious code can be injected through various channels and then executed. This paper presents an environment for scanning potential code injection vulnerabilities in HTML5 Android apps. Our environment performs a black-box test that injects traceable HTML tags into an app running on a hardware device or an emulator through internal...
Mobile Edge Computing (MEC) promises a paradigm shift in enabling efficient Mobile Cloud Computing (MCC) services by providing storage and processing capacity within the access range of the mobile devices. In MEC, Mobile Edge (ME) servers are placed at the edge of the mobile networks eliminating the need to offload compute-/storage-intensive tasks of the mobile devices to the core of the network (the...
In a multi-organization environment like the GRID, each institute might want to apply some boundaries on how its resources are being utlized by other institutes. A disagreement between the multi-Virtual Organizations (VOs) might happen in the security aspect for the policy framework. Mobile Grid Services has given the ability to move jobs, data and application software from nodes to nodes during jobs...
Mobile E-commerce (M-commerce) service raises a number of security and privacy challenges. To address this, we propose an advanced mobile security solution and related security methodology based on distribute key without changing hardware configuration of the mobile devices. The solution consists of the UE (User Equipment), an electronic security key (eKey) which is connected to the mobile device...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.