OWASP inspired mobile security.
Subrata AcharyaBranden EhrenreichJames MarciniakPublished in: BIBM (2015)
Keyphrases
- mobile commerce
- security requirements
- information security
- mobile phone
- access control
- security issues
- security systems
- network security
- security problems
- security mechanisms
- mobile devices
- security threats
- mobile learning
- computer security
- functional requirements
- security policies
- mobile technologies
- mobile networks
- statistical databases
- security analysis
- intrusion detection
- context aware
- service management
- mobile computing
- security management
- security measures
- learning experience
- user authentication
- physical layer