Fraud Prevention and User Privacy in Mobile Computing (extended summary)
نویسنده
چکیده
Recent years have seen an explosive interest in wireless (information) networks that support the mobility of subscribers (and/or terminals). These networks serve as a foundation of future universal, mobile and ubiquitous personal communications systems. Emerging wireless networks share many common characteristics with traditional wire-line networks such as public switched telephone/data networks, and hence many security issues with wire-line networks also apply to the wireless environment. Nevertheless, the mobility of subscribers, the transmission of signals through open-air and the requirement of low power consumption by a mobile equipment give a wireless network a large number of features distinctively different from those seen in a wire-line network. Especially, security and privacy becomes more eminent with wireless networks. For this reason, in this paper we will be primarily concerned with security issues related to or caused by the mobility of subscribers/terminals, open-air transmission of signals and low power supply of a mobile equipment. When examining the security in a wireless network, a large number of issues have to be considered. Some of the issues are addressed in the following.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملDesign and Development of a Mobile-Based Application for Identification, Prevention, and Control of Head Lice and Survey of User Satisfaction
Introduction: Using mobile phones is one of the ways to increase peoplechr('39')s knowledge and awareness. The objective of this study was to design and develop a mobile-based application for “identification, prevention, and control of head lice” and also to assess the satisfaction of mobile users with this educational application. Method: This descriptive cross-sectional study was conducted in...
متن کاملDesign and Development of a Mobile-Based Application for Identification, Prevention, and Control of Head Lice and Survey of User Satisfaction
Introduction: Using mobile phones is one of the ways to increase peoplechr('39')s knowledge and awareness. The objective of this study was to design and develop a mobile-based application for “identification, prevention, and control of head lice” and also to assess the satisfaction of mobile users with this educational application. Method: This descriptive cross-sectional study was conducted in...
متن کاملSMS Advertising and Consumer Privacy: Analysis of Factors Affecting Consumer Willingness to send and Receive Information in Permission and Data based SMS advertising
The increasing penetration rate of mobile phone, with specific characteristics of this medium, such as almost everywhere with the audience, has attracted companies' attention to it as an advertising channel. Mobile devices facilitate highly customized marketing communication in terms of person, time location and context so numbers of companies that use this medium for communicating with their c...
متن کامل