SS'08 Proceedings of the 17th conference on Security symposium
A risk management process for consumers: the next step in information security
Proceedings of the 2010 workshop on New security paradigms
Hi-index | 0.00 |
Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model that can be used as a roadmap for improving their security. Additionally, several shortcomings of the data-centric approach are discussed.