Smartphone security 'taint' what it used to be: technical perspective.
Dan S. WallachPublished in: Commun. ACM (2014)
Keyphrases
- security policies
- access control
- security requirements
- information security
- network security
- windows xp
- security systems
- information assurance
- intrusion detection
- security issues
- buffer overflow
- mobile devices
- security management
- network management
- security measures
- security threats
- functional requirements
- data security
- security protocols
- data integrity
- control flow
- security mechanisms
- information flow
- mobile applications
- distributed systems