Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones.
Thomas ZeffererPeter TeuflPublished in: SECRYPT (2013)
Keyphrases
- end users
- mobile devices
- mobile applications
- smart phones
- user friendliness
- mobile commerce
- mobile computing environment
- mobile phone
- context aware
- content providers
- application development
- user requirements
- mobile learning
- mobile computing
- mobile platforms
- mobile users
- desktop computers
- mobile technologies
- mobile apps
- location based services
- user interface
- network management
- ubiquitous computing environments
- mobile platform
- handheld devices
- small screen
- wifi
- user experience
- mobile networks
- web applications
- learning activities
- m learning
- tablet computers
- data management
- service providers
- mobile computing devices
- information security
- android platform
- business intelligence
- pervasive computing
- access control
- smart devices
- security requirements
- decision making
- remote server
- ubiquitous computing
- network security
- decision support
- mobile terminals
- user driven
- location aware