Spalka, Adrian ; Cremers, Armin ; Winandy, Marcel (2005)
Multilateral Security Considerations for Adaptive Mobile Applications.
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality to an application at the time, when the user requests it. But to make this versatile technology a success, the security of all concerned parties must be addressed. This work, which is in part embedded in a T-Com project, presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party's role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2005 |
Autor(en): | Spalka, Adrian ; Cremers, Armin ; Winandy, Marcel |
Art des Eintrags: | Bibliographie |
Titel: | Multilateral Security Considerations for Adaptive Mobile Applications |
Sprache: | Deutsch |
Publikationsjahr: | 2005 |
Verlag: | INSTICC |
Buchtitel: | 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005) |
Kurzbeschreibung (Abstract): | Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality to an application at the time, when the user requests it. But to make this versatile technology a success, the security of all concerned parties must be addressed. This work, which is in part embedded in a T-Com project, presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party's role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments. |
Freie Schlagworte: | adaptive applications, mobile phone, multilateral security, requirements analysis |
ID-Nummer: | TUD-CS-2005-0005 |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Systemsicherheit |
Hinterlegungsdatum: | 10 Mär 2016 10:18 |
Letzte Änderung: | 27 Sep 2018 09:20 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |