Benchmarking User-Defined Security Configuration of Mobile Devices.
Daniel VecchiatoEliane MartinsPublished in: LADC (2016)
Keyphrases
- user defined
- mobile devices
- mobile commerce
- context aware
- data types
- mobile learning
- mobile phone
- security issues
- mobile environments
- query language
- intrusion detection
- information security
- mobile computing
- access control
- security policies
- network security
- security requirements
- information retrieval
- tablet computers
- mobile services
- location based services
- learning activities
- smart phones
- desktop computers
- statistical databases
- remote server
- mobile computing environment
- mobile applications
- mobile technologies
- ubiquitous computing
- mobile users
- database
- data management
- data warehouse
- data mining