Affiliation:
1. Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy
Abstract
In these last years, mobile devices, such as mobile phones or Personal Digital Assistants, became very popular among people. Moreover, mobile devices became also very powerful, and most of them are also able to execute applications, such as games, Internet browsers, e-mail clients, and so on. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as the contact list). This chapter describes the approaches that have been proposed in scientific literature to guarantee the security of mobile devices.
Reference36 articles.
1. Aktug, I., & Naliuka, K. (2007). ConSpec: A formal language for policy specification. In Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 07), (pp. 107-109).
2. ConSpec – A Formal Language for Policy Specification
3. Balfe, S., Yau, P., & Paterson, K. G. (2009). A guide to trust in mobile ad hoc networks. Security and Communication Networks, 3(6).
4. Barthe, G., Beringer, L., Crégut, P., Grégoire, B., & Hofmann, M. Müller, P., ... Vétillard, E. (2007). MOBIUS: Mobility, ubiquity, security - objectives and progress report. In Trustworthy Global Computing: Revised Selected Papers from the Second Symposium TGC 2006, Lecture Notes in Computer Science. 4461, (pp. 10-29). Springer-Verlag.
5. Capra, L. (2004). Engineering human trust in mobile system collaborations. In Proceedings of the 12th International Symposium on the Foundations of Software Engineering (SIGSOFT 2004/FSE-12), (pp. 107-116). New York, NY: ACM Press.