Sciweavers

93 search results - page 1 / 19
» Matching Policies with Security Claims of Mobile Application...
Sort
View
IEEEARES
2008
IEEE
13 years 11 months ago
Matching Policies with Security Claims of Mobile Applications
The Security-by-Contract (S×C) framework has been recently proposed to address the trust relationship problem of the current security model adopted for mobile devices. The key id...
Nataliia Bielova, Marco Dalla Torre, Nicola Dragon...
ACSAC
2000
IEEE
13 years 9 months ago
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha...
ACSAC
2007
IEEE
13 years 11 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
POLICY
2007
Springer
13 years 11 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
FASE
2003
Springer
13 years 10 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft