TU Darmstadt / ULB / TUbiblio

Multilateral Security Considerations for Adaptive Mobile Applications

Spalka, Adrian ; Cremers, Armin ; Winandy, Marcel (2005)
Multilateral Security Considerations for Adaptive Mobile Applications.
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality to an application at the time, when the user requests it. But to make this versatile technology a success, the security of all concerned parties must be addressed. This work, which is in part embedded in a T-Com project, presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party's role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2005
Autor(en): Spalka, Adrian ; Cremers, Armin ; Winandy, Marcel
Art des Eintrags: Bibliographie
Titel: Multilateral Security Considerations for Adaptive Mobile Applications
Sprache: Deutsch
Publikationsjahr: 2005
Verlag: INSTICC
Buchtitel: 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005)
Kurzbeschreibung (Abstract):

Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality to an application at the time, when the user requests it. But to make this versatile technology a success, the security of all concerned parties must be addressed. This work, which is in part embedded in a T-Com project, presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party's role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments.

Freie Schlagworte: adaptive applications, mobile phone, multilateral security, requirements analysis
ID-Nummer: TUD-CS-2005-0005
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Systemsicherheit
Hinterlegungsdatum: 10 Mär 2016 10:18
Letzte Änderung: 27 Sep 2018 09:20
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen