A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
Denial-of-Service Attacks on Battery-powered Mobile Computers
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Research on Context-Aware Mobile Computing
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
Context-Aware Computing Applications
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
Understanding influence of mobile internet services on life behavior of mobile users
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: applications and services
Using labeling to prevent cross-service attacks against smart phones
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Hi-index | 0.00 |
A mobile communication device is a small size of portable computer which provides communication service. One of the biggest barriers in developing the mobile communication device is security. To protect itself against security threats, the mobile communication device need to be loaded with various kinds of security functions such as firewall, access control, and so on. However because the mobile communication device has relatively poor computing power and inconvenient user interface, it may experience performance deterioration and user inconveniency in case that it employs all the security functions. This paper proposes a context-aware dynamic security configuration scheme for effective security management of the mobile communication device. Our scheme can maximize the performance of the mobile communication device in terms of computing resource efficiency and user convenience without degrading security level by automatically optimizing its security configuration based on its security context. The performance of our scheme is measured and evaluated through experiments.