Buch, Englisch, Band 107, 131 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 230 g
4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papers
Buch, Englisch, Band 107, 131 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 230 g
ISBN: 978-3-642-33391-0
Verlag: Springer
This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of security, highlighting the practical importance of security of mobile devices in concrete usages. Contributions to MobiSec 2012 range from treatments on user privacy issues, over mobile application and app security, to mobile identity management, and NFC. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Mobilfunk- und Drahtlosnetzwerke & Anwendungen
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
APEFS: An Infrastructure for Permission-based filtering of Android Apps.-A Guidance Model for Architecting Secure Mobile Applications.-Mobile smart card reader using NFC-enabled smartphones.-Claim-based versus network-based identity management: a hybrid approach.-Program Structure-Based Feature Selection for Android Malware Analysis.-Presenting the Brazilian Project TSAM – Security Technologies for Mobile Environments.-Scalable Trust Assessment and Remediation of Wireless Devices.-Verifying the Location of a Mobile Device User.-Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments.-Securing Mobile Machine Interactions with Location Histories.-PEPPeR: A querier’s Privacy Enhancing Protocol for PaRticipatory sensing.-Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks.-Securing Data Privacy on Mobile Devices in Emergency Health Situations.