Security composition in the real world: squaring the circle of mobile security with contemporary device economics.
Jon A. GeaterPublished in: SPSM@CCS (2013)
Keyphrases
- real world
- access control
- intrusion detection
- information security
- wide range
- mobile devices
- network security
- security systems
- security requirements
- security issues
- statistical databases
- computational intelligence
- remote server
- security policies
- mobile phone
- computer security
- security problems
- factor authentication
- mobile computing devices
- portable devices
- security threats
- service management
- security level
- key management
- functional requirements
- mobile computing
- computing environments
- data mining