Login / Signup
Smartphone security 'taint' what it used to be: technical perspective.
Dan S. Wallach
Published in:
Commun. ACM (2014)
Keyphrases
</>
security policies
access control
security requirements
information security
network security
windows xp
security systems
information assurance
intrusion detection
security issues
buffer overflow
mobile devices
security management
network management
security measures
security threats
functional requirements
data security
security protocols
data integrity
control flow
security mechanisms
information flow
mobile applications
distributed systems