Agile development of secure web applications
ICWE '06 Proceedings of the 6th international conference on Web engineering
Enhancing web browsing security on public terminals using mobile composition
Proceedings of the 6th international conference on Mobile systems, applications, and services
Security Policy Composition for Composite Services
ICWE '08 Proceedings of the 2008 Eighth International Conference on Web Engineering
Proceedings of the ACM SIGCOMM 2010 conference
Deep shot: a framework for migrating tasks across devices using mobile phone cameras
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Shining chrome: using web browser personas to enhance SSL certificate visualization
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV
Secure mobile computing via public terminals
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Digifieds: insights into deploying digital public notice areas in the wild
Proceedings of the 10th International Conference on Mobile and Ubiquitous Multimedia
Muse: a multimedia streaming enabled remote interactivity system for mobile devices
Proceedings of the 10th International Conference on Mobile and Ubiquitous Multimedia
Privacy-aware shared UI toolkit for nomadic environments
Software—Practice & Experience
Push and pull of web user interfaces in multi-device environments
Proceedings of the International Working Conference on Advanced Visual Interfaces
Future Generation Computer Systems
Hi-index | 0.00 |
In ubiquitous environments migratory interactive applications allow users to perform their tasks continuously across various devices. Users can push and pull migratory Web applications from one device to another for various reasons. However, the flexibility of such pervasive applications raises various security issues, such as the risk of theft of private information from the migrated user interfaces or the intrusion of malicious versions of the applications replacing the original ones. In this paper, we analyse such risks and present a number of solutions to address them in a client/server-based solution for supporting secure migration of interactive Web applications.