Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Flexible authentication framework with bound authentication and authorization
WSEAS TRANSACTIONS on COMMUNICATIONS
Framework for security management of mobile devices
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Hi-index | 0.00 |
This paper proposes the method for reconstructing the security function of the mobile devices based on the security profiles statically or dynamically. The security functional profiles are defined according to the basic circumstance element including the kind of the mobile equipment, the connected network, the offered services, the level of user, and etc. in advance. When the security function of the mobile devices is reconfigured statically or dynamically according to situation, security services are offered more actively and flexibly.