TU Darmstadt / ULB / TUbiblio

Multilateral Security Considerations for Adaptive Mobile Applications

Spalka, Adrian and Cremers, Armin and Winandy, Marcel (2005):
Multilateral Security Considerations for Adaptive Mobile Applications.
In: 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005), INSTICC, [Conference or Workshop Item]

Abstract

Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality to an application at the time, when the user requests it. But to make this versatile technology a success, the security of all concerned parties must be addressed. This work, which is in part embedded in a T-Com project, presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party's role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments.

Item Type: Conference or Workshop Item
Erschienen: 2005
Creators: Spalka, Adrian and Cremers, Armin and Winandy, Marcel
Title: Multilateral Security Considerations for Adaptive Mobile Applications
Language: German
Abstract:

Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality to an application at the time, when the user requests it. But to make this versatile technology a success, the security of all concerned parties must be addressed. This work, which is in part embedded in a T-Com project, presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party's role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments.

Title of Book: 2nd International Conference on E-Business and Telecommunication Networks (ICETE 2005)
Publisher: INSTICC
Uncontrolled Keywords: adaptive applications, mobile phone, multilateral security, requirements analysis
Divisions: 20 Department of Computer Science
20 Department of Computer Science > System Security Lab
Date Deposited: 10 Mar 2016 10:18
Identification Number: TUD-CS-2005-0005
Export:
Suche nach Titel in: TUfind oder in Google

Optionen (nur für Redakteure)

View Item View Item