Is now the time to define a mobile security policy?

被引:1
|
作者
Hunter, Philip
机构
来源
Computer Fraud and Security | 2007年 / 2007卷 / 06期
关键词
Computer crime - Mobile computing - Security systems;
D O I
10.1016/S1361-3723(07)70076-3
中图分类号
学科分类号
摘要
引用
收藏
页码:10 / 12
相关论文
共 50 条
  • [41] A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks
    Workman, Michael
    Ford, Richard
    Allen, William
    INFORMATION SECURITY JOURNAL, 2008, 17 (5-6): : 267 - 277
  • [42] RULE-BASED MONITORS AND POLICY INVARIANTS FOR GUARANTEEING MOBILE CODE SECURITY
    Makela, Sanna
    Makela, Sami
    Leppanen, Ville
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2015, 7 (02): : 17 - 36
  • [43] Security Problems Analysis and Solving Policy Design for Mobile Agents Running Platform
    Tong, Yan
    Zhang, Jian
    Qin, Tao
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING (ICIIP'16), 2016,
  • [44] A model checking-based approach for security policy verification of mobile systems
    Braghin, Chiara
    Sharygina, Natasha
    Barone-Adesi, Katerina
    FORMAL ASPECTS OF COMPUTING, 2011, 23 (05) : 627 - 648
  • [45] Mobile Smart-work Appling to Security Policy For Data Loss Tracking
    Ju, Seung-hwan
    Seo, Hee-suk
    Lee, Seung-jae
    Lee, Jong-sung
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (05): : 1997 - 2006
  • [46] Extension of security policy in Java']Java-based mobile agent systems
    Simek, M
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 383 - 387
  • [47] First mobile phones, now mobile numbers
    不详
    JOURNAL OF THE INSTITUTION OF BRITISH TELECOMMUNICATIONS ENGINEERS, 2001, 2 : 3 - 3
  • [48] Moving to a now level of security
    不详
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2004, 96 (01): : 2 - 2
  • [49] Computer Network Security: Then and Now
    Witzke, Edward L.
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 233 - 239
  • [50] Global health security now
    Horton, Richard
    Das, Pamela
    LANCET, 2015, 385 (9980): : 1805 - 1806