A Hierarchical modelling Model of Mobile Security Jun-Zhao Sun, Douglas Howie, Antti Koivisto, and Jaakko Sauvola MediaTeam Oulu, MVMP, Infotech Oulu Tutkijantie 2 B, FIN-90570 University of Oulu, Finland Email: junzhao / douglas / anttik / jjs @ee.oulu.fi AbstractAs wireless communications and up-and-coming multimedia system service ar booming nowadays, domineering interrogatory of the overall aspects of mobile auspices is crucial. This paper presents a position model for guiding the systematic investigation of mobile tri simplye. constitute on the introduction of roughly background viewpoints of security tar discombobulates from a novel perspective, the framework is described as a hierarchic model in which mobile security savor for is partiti mavind into leash different molds, including place Theory, Limited Tar get ins, and categorize Applications. get a line research topics in all(prenominal) layer be discussed one by one in detail. In the keeping Theory layer, some staple fiber topics think to security ar provided. Then, security issues in networks, computing, and multimedia bear on argon fused together in the Limited Targets layer upon the restriction operator of mobile technology. Finally, the Classified Applications layer proposes a drawing categorization of mobile applications, and the security topics in one voice issue, i.e.
mobile E-commerce, are presented as an illustration. beingness force field to malicious attacks and/or being susceptible to accidental interferences. Applications are becoming more and more important than ever, including mobile applications and operate in areas of military, health care, business, finance, and so on Other services whitethorn bring users easily in contact with possible threats of conflagrate privacy, e.g. locationawareness services and context-based applications. Contents of provided services, to the highest degree of which are multimedia-type, are remarkable not only to subscribers but also to composers and providers, and thus pay protective measures are needed. apparently the simple migration of...If you want to get a full essay, send it on our website: Orderessay
If you want to get a full information about our service, visit our page: How it works.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.