Coming along with the spread of location-independent wireless networks and attractive mobile devices like “smartphones ” or “pads”, activities in the Web increasingly take place in volatile mobile environments, even if sensitive information objects are involved. In this paper a approach is proposed to apply security measures to such objects in a context sensitive, flexible way. It is based on semantic models of the user’s context and his or her security concepts. Categories and Subject Descriptors K.4.4 [Computers and Society]: Electronic Commerce –Security
The ability to ‘smartly’ ascertain and adapt to the context of a situation or scenario is known as c...
Abstract. Recently mobile widespread services are widely deployed. The delivery of these services sh...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
Abstract. The purpose of this study is to develop and present security assessment models to manage t...
Strong security for mobile devices plays an increasingly important role in protecting sensitive data...
The exploitation of context-awareness, especially in mobile devices bears a huge potential. For exam...
Abstract. The openness and heterogeneity of next generation communication networks are now highlight...
The openness and heterogeneity of next generation communication networks are now highlighting more s...
The exploitation of context-awareness, especially in mobile devices bears a huge potential. For exam...
Abstract:- In this paper, we present a framework model for E-commerce. We divide the framework model...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
With the recent developments in the cellular world, the high-end mobile phones and PDAs are becoming...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
The wide adoption of handled devices and remote ser-vices arises a number of security problems for u...
The ability to ‘smartly’ ascertain and adapt to the context of a situation or scenario is known as c...
Abstract. Recently mobile widespread services are widely deployed. The delivery of these services sh...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
Abstract. The purpose of this study is to develop and present security assessment models to manage t...
Strong security for mobile devices plays an increasingly important role in protecting sensitive data...
The exploitation of context-awareness, especially in mobile devices bears a huge potential. For exam...
Abstract. The openness and heterogeneity of next generation communication networks are now highlight...
The openness and heterogeneity of next generation communication networks are now highlighting more s...
The exploitation of context-awareness, especially in mobile devices bears a huge potential. For exam...
Abstract:- In this paper, we present a framework model for E-commerce. We divide the framework model...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
With the recent developments in the cellular world, the high-end mobile phones and PDAs are becoming...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
The wide adoption of handled devices and remote ser-vices arises a number of security problems for u...
The ability to ‘smartly’ ascertain and adapt to the context of a situation or scenario is known as c...
Abstract. Recently mobile widespread services are widely deployed. The delivery of these services sh...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...