[go: up one dir, main page]

Lima et al., 2018 - Google Patents

An Introduction to Mobile Device Security

Lima et al., 2018

Document ID
2198208020504526188
Author
Lima A
Borges P
Sousa B
Simões P
Cruz T
Publication year
Publication venue
Mobile Apps Engineering

External Links

Snippet

Mobile device capabilities have increased dramatically over the past decade, allowing users to carry a sophisticated mix of computing power and connectivity options, in a diversity of convenient form-factors (eg, wearables, smartphones, tablets). This evolution has made it …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security

Similar Documents

Publication Publication Date Title
US12026261B2 (en) Quarantine of software by an evaluation server based on authenticity analysis of user device data
EP3706022B1 (en) Permissions policy manager to configure permissions on computing devices
US12081540B2 (en) Configuring access to a network service based on a security state of a mobile device
Suarez-Tangil et al. Evolution, detection and analysis of malware for smart devices
Shabtai et al. Google android: A state-of-the-art review of security mechanisms
US9787681B2 (en) Systems and methods for enforcing access control policies on privileged accesses for mobile devices
US9609020B2 (en) Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines
Spensky et al. Sok: Privacy on mobile devices–it’s complicated
US20130312058A1 (en) Systems and methods for enhancing mobile security via aspect oriented programming
US20140157355A1 (en) Systems and methods for enhancing mobile device security with a processor trusted zone
Zaidi et al. A survey on security for smartphone device
Dye et al. A standard for developing secure mobile applications
Sikder et al. A survey on android security: development and deployment hindrance and best practices
Schmidt Detection of smartphone malware
WO2015013410A2 (en) Systems and methods for enhancing mobile security via aspect oriented programming
KR20160145574A (en) System and method for enforcing security in mobile computing
Gupta et al. A risk-driven model to minimize the effects of human factors on smart devices
Jeong et al. SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform
Saha et al. Review of considerations for mobile device based secure access to financial services and risk handling strategy for CIOs, CISOs and CTOs
Lima et al. An Introduction to Mobile Device Security
Goel et al. Overview of smartphone security: Attack and defense techniques
Muttik Securing mobile devices: Present and future
Abdul Kadir et al. Android Operating System
Gorbāns et al. The Myths of and Solutions for Android OS Controlled and Secure Environment
Brooks et al. Secure the edge? Understanding the risk towards wireless grids Edgeware technology