A Simple Security Architecture for Mobile Office
نویسندگان
چکیده
The Mobile Offices services based on Bring Your Own Device (BYOD) are getting more popular as the use of smart phone grows rapidly. As the free wireless services are being spread, malicious codes can be spread easily. Therefore, how we will provide security in an environment of free wireless has become an issue. This paper suggests security architecture for the better mobile office security and presents required procedures and the analysis of the expected security enhancement.
منابع مشابه
Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملContext-based Authentication Service for The Mobile Office
Today many companies introduce new mobile office environments evolved from the recent rapid development in mobile device technologies. Most of the recent mobile office systems use a simple authentication scheme such as ID/Password. This method is easy to use, but it does not consider the user's context. Thus it cannot provide appropriate security service required by the user’s proper contexts. ...
متن کاملImplementation of Mobile-Cloudlet-Cloud Architecture for Face Recognition in Cloud Computing using Android Mobile
Real time face recognition applications use face recognition algorithms, which extract information such as shape, size, and position of facial features (eyes, nose, ear, lips) and then compare this extracted feature to stored featured database to locate matching images. Face recognition application used in airport security, in passport office, in R.T.O office, in government organization, in dev...
متن کاملEmbedding expression: Pervasive computing architecture for art and entertainment
Pervasive computing’s historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural activities. It also suggests and offers the means to achieve new types of expression in art and entertainment, which has not been a significant area of research despite its cultural and socio-economic importance and unique req...
متن کامل