Spalka, Adrian and Cremers, Armin and Winandy, Marcel (2005):
Multilateral Security Considerations for Adaptive Mobile Applications.
In: 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), pp. 133-137,
INSTICC, [Conference or Workshop Item]
Abstract
Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality to an application at the time, when the user requests it. But to make this versatile technology a success, the security of all concerned parties must be addressed. This work, which is in part embedded in a T-Com project, presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party's role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments.
Item Type: | Conference or Workshop Item |
---|---|
Erschienen: | 2005 |
Creators: | Spalka, Adrian and Cremers, Armin and Winandy, Marcel |
Title: | Multilateral Security Considerations for Adaptive Mobile Applications |
Language: | German |
Abstract: | Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality to an application at the time, when the user requests it. But to make this versatile technology a success, the security of all concerned parties must be addressed. This work, which is in part embedded in a T-Com project, presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party's role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments. |
Title of Book: | 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005) |
Publisher: | INSTICC |
Uncontrolled Keywords: | adaptive applications, mobile phone, multilateral security, requirements analysis |
Divisions: | 20 Department of Computer Science 20 Department of Computer Science > System Security Lab |
Date Deposited: | 10 Mar 2016 10:18 |
Identification Number: | TUD-CS-2005-0005 |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
![]() |
Send an inquiry |
Options (only for editors)
![]() |
Show editorial Details |