Description |
1 online resource |
Series |
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1867-8211 ; 107 |
|
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 107.
|
Contents |
Part 1. Monday, 25 June 2012 (Day 1). APEFS: An Infrastructure for Permission-Based Filtering of Android Apps / Simon Meurer and Roland Wismüller -- A Guidance Model for Architecting Secure Mobile Applications / Widura Schwittek, André Diermann and Stefan Eicker -- Mobile Smart Card Reader Using NFC-Enabled Smartphones / Frank Morgner, Dominik Oepen, Wolf Müller and Jens-Peter Redlich -- Claim-Based versus Network-Based Identity Management: A Hybrid Approach / Faysal Boukayoua, Jan Vossaert, Bart De Decker and Vincent Naessens -- Program Structure-Based Feature Selection for Android Malware Analysis / Andrew Walenstein, Luke Deshotels and Arun Lakhotia -- Presenting the Brazilian Project TSAM -- Security Technologies for Mobile Environments / Alexandre M. Braga, Erick N. Nascimento and Lucas R. Palma -- Scalable Trust Assessment and Remediation of Wireless Devices / Andreas Leicher, Andreas U. Schmidt and Yogendra Shah |
|
Part 2. Tuesday, 26 June 2012 (Day 2). Verifying the Location of a Mobile Device User / Jack Brassil and Pratyusa K. Manadhata -- Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments / Denis Feth and Christian Jung -- Securing Mobile Device-Based Machine Interactions with User Location Histories / Philipp Marcus, Moritz Kessel and Claudia Linnhoff-Popien -- PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing / Tassos Dimitriou, Ioannis Krontiris and Ahmad Sabouri -- Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks / Mads Schaarup Andersen, Mikkel Baun Kjærgaard and Kaj Grønbæk -- Securing Data Privacy on Mobile Devices in Emergency Health Situations / Kalpana Singh, Jian Zhong, Vinod Mirchandani, Lynn Batten and Peter Bertok |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of security, highlighting the practical importance of security of mobile devices in concrete usages. Contributions to MobiSec 2012 range from treatments on user privacy issues, over mobile application and app security, to mobile identity management, and NFC. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Computer network architectures |
|
Data protection |
|
Information Systems |
|
Systems and Data Security |
|
Computer System Implementation |
Bibliography |
Includes bibliographical references and author index |
Notes |
English |
In |
Springer eBooks |
Subject |
Mobile communication systems -- Security measures -- Congresses
|
|
Data protection -- Congresses
|
|
Electronic Data Processing
|
|
computer science.
|
|
data processing.
|
|
Informatique.
|
|
Data protection
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Schmidt, Andreas U.
|
ISBN |
9783642333927 |
|
3642333923 |
|
3642333915 |
|
9783642333910 |
|