Mobile communication security controllers an evaluation paper

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile communication security controllers an evaluation paper

Cellular communication via a traditional mobile handset is a ubiquitous part of modern life and as device technology and network performance continues to advance, it becomes possible for laptop computers, Personal Digital Assistants (PDAs) and even electrical meters to better exploit mobile networks for wireless communication. As the diverse demands for network access and value added services i...

متن کامل

Security in Mobile Communication Systems

Mobile computing has become very important and popular in networking. And it will certainly become even more popular because of the beneets it can ooer. But mobility also raises some important security issues and even vulnerabilities. This paper lists the most signiicant security constraints and threats that the mobile communication systems have.

متن کامل

Mobile Resource Guarantees Evaluation Paper

This paper summarises the main outcomes of theMobile Resource Guarantees (MRG) project, a three year project funded by the EC under the FET proactive initiative on Global Computing, and discusses follow-up work in new projects that will build on these results.

متن کامل

Security in Public Mobile Communication Networks

The increasing use of mobile communication networks results in ever more stringent security requirements. In an information society, availability, integrity and confidentiality are essential. Especially the provision of the latter is hard to demonstrate. If someone or some component is able to collect and store personal data, one cannot be sure that this data is not gathered and not (mis)used. ...

متن کامل

Security Adaptation Components for Mobile Communication

Mobile computing and communication develops into an important factor in business, but it is accompanied with new security threats. The main problem lies on the one hand in the heterogeneity, dynamics and scarcity of the resources and on the other hand in the additional information like user location. In this paper, we investigate some issues concerning security of mobile computing systems, whic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Security Technical Report

سال: 2008

ISSN: 1363-4127

DOI: 10.1016/j.istr.2008.09.004