Adaptive Security Mechanism: a study on the different approaches to mobile devices
Abstract
Keywords
Full Text:
PDFReferences
Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. Personal Communications, IEEE, 8(4), 10-17.
Leeuwen, J. (1990). Handbook of theoretical computer science: algorithms and complexity (Vol. 1). Elsevier.
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC press.
Jiang, W., Guo, Z., Ma, Y., & Sang, N. (2013). Measurement-based research on cryptographic algorithms for embedded real-time systems. Journal of Systems Architecture, 59(10), 1394-1404.
Qi, H., & Gani, A. (2012, May). Research on mobile cloud computing: Review, trend and perspectives. In Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on (pp. 195-202). ieee.
Gupta, S. K. S., & Srimani, P. K. (2000). Experience in teaching a graduate course in mobile computing. In Frontiers in Education Conference, 2000. FIE 2000. 30th Annual (Vol. 2, pp. S1C-6). IEEE.
Gartner. Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments On Pace to Grow 7.6 Percent in 2014.
Alliance, C. (2012). Security Guidance for Critical Areas of Mobile Computing, V1.0. Cloud Security Alliance.
Pirmez, M., Pirmez, L., da Costa Carmo, L. F. R., Delicato, F. C., Pires, P. F., & de Sousa, E. B. (2008). Prometheus: Um Servio de Segurana Adaptativa. SBSEG2008, Gramado, RS (to appear).
An, G., Bae, G., Kim, K., & Seo, D. (2009, December). Context-aware dynamic security configuration for mobile communication device. In New Technologies, Mobility and Security (NTMS), 2009 3rd International Conference on (pp. 1-5). IEEE.
Cirqueira, A. C., Andrade, R. M., & de Castro, M. F. (2011). Um mecanismo de segurana com adaptao dinmica em tempo de execuo para dispositivos mveis. Seminrio Integrado de Software e Hardware, 1337-1351.
Lee, H., & Chung, M. (2011, October). Context-Aware Security model for Social Network Service. In Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on(pp. 144-151). IEEE.
Moraes, R. U. M. (2014). Ssacc - servio de segurana para autenticao ciente do contexto: para dispositivos mveis no paradigma da computao em nuvem. Masters thesis, UNIVERSIDADE FEDERAL DO MARANHO.
Elgamal, T., & Hickman, K. E. (1998). U.S. Patent No. 5,825,890. Washington, DC: U.S. Patent and Trademark Office.
Kurose , J. F., Ross, K. W., & Marques, A. S. (2003). Redes de Computadores e a Internet: Uma nova abordagem, volume 1. Addison Wesley.
Oreizy, P., Medvidovic, N., & Taylor, R. N. (2008, May). Runtime software adaptation: framework, approaches, and styles. In Companion of the 30th international conference on Software engineering (pp. 899-910). ACM.
Refbacks
- There are currently no refbacks.
Copyright (c) 2015 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright © 2014 Journal of Information Sciences and Computing Technologies. All rights reserved.
ISSN: 2394-9066
For any help/support contact us at jiscteditor@scitecresearch.com.