Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 837
Release: 2021-02-05
Genre: Technology & Engineering
ISBN: 1799886018

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.

Computer Security - ESORICS 96

Computer Security - ESORICS 96
Author: Elisa Bertino
Publisher: Springer Science & Business Media
Total Pages: 390
Release: 1996-09-16
Genre: Business & Economics
ISBN: 9783540617709

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96. The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Mobile Agents

Mobile Agents
Author: Niranjan Suri
Publisher: Springer
Total Pages: 213
Release: 2003-06-30
Genre: Computers
ISBN: 354036112X

Welcome to the proceedings of the 6th IEEE International Conference on Mobile Agents. MA 2002 took place in Barcelona, Spain and was co-located with the 4th International Workshop on Mobile Agents for Telecommunications Applications. Both events were held at the Universitat Pompeu Fabra, October 22–25, 2002. Mobile agents may be de?ned as programs that, with varying degree of - tonomy, can move between hosts across a network. Mobile agents combine the notions of mobile code, mobile computation, and mobile state. Capabilities of mobile agents include: – Supporting unrealiable networks and disconnected operation – Counteracting low-bandwidth, high-latency communication links – Deploying newbehaviour (through mobile code) and recon?guring systems on-the-?y – Distributing processing load across systems – Improving survivability in the face of network and system failure. Given the above capabilities, mobile agents (while they may not be referred to as such) are nowbecoming accepted as a fundamental architectural construct for the design and development of complex adaptive systems that need to operate in highly dynamic environments. Mobile agents also support applications in several domains such as ubiquitous computing, grid computing, remote sensing, data mining, system management, and agile computing.

Mobile Agents

Mobile Agents
Author: Gian P. Picco
Publisher: Springer
Total Pages: 289
Release: 2003-06-30
Genre: Computers
ISBN: 3540456473

Recent years have witnessed the appearance of new paradigms for designing distributed applications where the application components can be relocated - namically across the hosts of the network. This form of code mobility lays the foundation for a new generation of technologies, architectures, models, and - plications in which the location at which the code is executed comes under the control of the designer, rather than simply being a con?guration accident. Among the various ?avors of mobile code, the mobile agent paradigm has become particularly popular. Mobile agents are programs able to determine - tonomously their own migration to a di?erent host, and still retain their code and state (or at least a portion thereof). Thus, distributed computations do not necessarily unfold as a sequence of requests and replies between clients and - mote servers, rather they encompass one or more visits of one or more mobile agents to the nodes involved. Mobile code and mobile agents hold the potential to shape the next gene- tion of technologies and models for distributed computation. The ?rst steps of this process are already evident today: Web applets provide a case for the least sophisticated form of mobile code, Java-based distributed middleware makes - creasing use of mobile code, and the ?rst commercial applications using mobile agents are starting to appear.

Computer Security - ESORICS 2000

Computer Security - ESORICS 2000
Author: Frederic Cuppens
Publisher: Springer
Total Pages: 335
Release: 2006-12-31
Genre: Computers
ISBN: 3540452990

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

Security Modeling and Analysis of Mobile Agent Systems

Security Modeling and Analysis of Mobile Agent Systems
Author: Lu Ma
Publisher: Imperial College Press
Total Pages: 214
Release: 2006
Genre: Computers
ISBN: 1860949053

A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications. Sample Chapter(s). Chapter 1: Introduction (97 KB). Contents: Mobile Agent System; Attacks and Countermeasures of Software System Security; Security Issues in a Mobile Agent System; A New Formal Model OCo Extended Elementary Object System (EEOS); A Formal Framework of a Generic Secure Mobile Agent System Based on EEOS; Translating the EEOS Model to Colored Petri Net Model; Simulation and Analysis of the Extended Elementary Object System Model of a Secure Mobile Agent System; A Case Study in Electronic Commerce; A Case Study in E-Auction System. Readership: Computer scientists, researchers, software engineers, programmers and graduate students in software engineering, networking and automated systems."

Mobile Computing

Mobile Computing
Author: Kumkum Garg
Publisher: Pearson Education India
Total Pages: 236
Release: 2010-09
Genre: Mobile computing
ISBN: 9788131731666

"The book covers all basic concepts of mobile computing and communication and also deals with latest concepts like Bluetooth Security and Nokia Handhelds"--Resource description page.

Information Systems Security

Information Systems Security
Author: Aditya Bagchi
Publisher: Springer
Total Pages: 394
Release: 2006-11-28
Genre: Computers
ISBN: 354068963X

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.

Mobile Agents

Mobile Agents
Author: Peter Braun
Publisher: Morgan Kaufmann
Total Pages: 466
Release: 2005
Genre: Computers
ISBN: 1558608176

Af indhold: Part 1, Motivation for and Introduction to Mobile Agents. Part 2, Mobile Agents - Concepts, Functions, and possible Problems. Part 3, The Kalong Mobility Model - Specification and Implementation. Part 4, The Tracy Mobile Agent Toolkit