Conceptual Framework for Mobile Device Product Line Security based on Internet of Thing

نویسندگان

  • Regin Joy Conejar
  • Haeng-Kon Kim
چکیده

Numerous technology devices have been propelled to explore the prospects of mobile devices. There is a growing demand to transform the existing PC-based software systems to mobile device platforms since mobile devices are low-cost compared for a PC, and their affordance, usability, and user-friendliness are such that they can theoretically counterpart or even replace traditional computer technology and mobile devices perform well using a lesser amount of memory than PC-based systems. Mobile device product lines are promising approaches for deriving and delivering custom-made applications to devices. In this paper, a conceptual framework for the mobile device product line is designed to create a strategic concept on how the mobile device delivers its application towards its users. It is designed to construct an interaction within the mobile application to its user devices. Mobile Device Product Line Security is a new concept, which appears with the Internet of Things (IoT) application in industry. This technology applied in production systems provides many benefits like better transparency or real-time information. This approach proposes a conceptual framework for IoT application in Production Systems Security. The aim of this framework is helping enterprises to identify the main elements to apply IoT in Mobile Device Product Line Security Systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Conceptual Framework of Individual and Social Security Provision in Residential Complexes Based on Iranian-Islamic Foundations

Security as one of the basic human needs has a special place in relaxation, comfort and spiritual needs provision. For this reason, security is always of managers, planners, architects and urban designers' interest. Solutions and strategies of security provision have been fundamentally changed following prevailing change of housing architecture patterns from homes to residential complexes and h...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

A Study on Internet of Things based Applications

This paper gives a detail analysis of various applications based on Internet of Thing (IoT)s. This explains about how internet of things evolved from mobile computing and ubiquitous computing. It emphasises the fact that objects are connected over the internet rather than people. The properties of Internet of Things (IOT) are product information, electronic tag, standard expressed and uploading...

متن کامل

فرصت ها و چالشهای تکنولوژی تلفن همراه در پیشگیری و درمان ایدز

Aim: mobile Health Technology is rapidly advancing and becoming a cost effective option for intervention delivery particularly for isolated and hard to reach populations, such as people living with HIV/AIDS. We conducted a literature review to evaluate mobile phone technology utilize for HIV prevention and care. Methods: We conducted a literature review using the search Terms from the MESH s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016