Towards data centric mobile security
Recently the usage of mobile devices has increased rapidly and it will be growing even more as mobile devices functionality is at enhanced. So the security of mobile devices needs to be improved. This paper discusses various components and functions of mobile devices such as SMS, wireless and applic...
| Main Authors: | Dehghantanha, Ali, Udzir, Nur Izura, Mahmod, Ramlan |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/69684/ http://psasir.upm.edu.my/id/eprint/69684/1/Towards%20data%20centric%20mobile%20security.pdf |
Similar Items
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012)
by: Asmawi, Aziah, et al.
Published: (2012)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Filtering events using clustering in heterogeneous security logs
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
Towards an Ontology for Geospatial User-centric Metadata
by: Ziaimatin, H., et al.
Published: (2018)
by: Ziaimatin, H., et al.
Published: (2018)
Security Management Model for Mobile Databases Transaction Management
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
Avian-centric design
by: Abdul Shukor, Shureen Faris
Published: (2015)
by: Abdul Shukor, Shureen Faris
Published: (2015)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
Adaptive data communication interface: a user-centric visual data interpretation framework
by: Figueredo, Grazziela P., et al.
Published: (2015)
by: Figueredo, Grazziela P., et al.
Published: (2015)
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011)
by: Abu Bakar, Azreena, et al.
Published: (2011)
Can academic librarians as data scientists revolutionise user-centric e-learning?
by: Sa'ari, Haziah, et al.
Published: (2023)
by: Sa'ari, Haziah, et al.
Published: (2023)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
Rangkaian Neural Untuk Sistem Dapatan Semula Perkataan Daripada Pangkalan Data
by: Udzir, Nur Izura
Published: (1998)
by: Udzir, Nur Izura
Published: (1998)
Ethical dimensions of user centric regulation
by: Urquhart, Lachlan
Published: (2017)
by: Urquhart, Lachlan
Published: (2017)
A formal veriļ¬cation and simulation of Common Criteria Recognition Arrangement (CCRA)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2019)
Understanding information centric layer of adaptive collaborative caching framework in mobile disconnection-prone networks
by: Huynh, Vu San Ha, et al.
Published: (2018)
by: Huynh, Vu San Ha, et al.
Published: (2018)
Understanding information centric layer of adaptive collaborative caching framework in mobile disconnection-prone networks
by: Huynh, Vu San Ha, et al.
Published: (2018)
by: Huynh, Vu San Ha, et al.
Published: (2018)
Towards a person-centric interface for information re-finding and sharing tasks
by: Holmes, Paul
Published: (2018)
by: Holmes, Paul
Published: (2018)
Inclusion of universal design towards user-centric interior design process in Malaysia
by: Mansor, Noranita
Published: (2017)
by: Mansor, Noranita
Published: (2017)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
A survey on cyber-crime prediction techniques
by: Shaerpour, Kaveh, et al.
Published: (2013)
by: Shaerpour, Kaveh, et al.
Published: (2013)
Similar Items
-
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013) -
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013) -
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012) -
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013) -
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)