QSIC 2006, Beijing, China, Oct. 2006Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the system. Especially, they should be very careful when they use a system with components and/or services provided by third parties. However, there are few methods or tools to learn and confirm such issues. In this paper, we present a supporting tool called “PORTAM” for such users and providers to understand the threats and the requirements. Suppose some requirements cannot be satisfied when some threats are avoided, and vice versa. In such cases, they should decide whether the requirements should be satisfied or the threats should be a...
Java is a popular programming language designed by Sun Microsystems and used for desktop application...
Next generation mobile networks and services are gaining market momentum every day. Service provider...
Research Article published by Scientific Publishing CenterAs the use of web and mobile applications ...
QSIC 2006, Beijing, China, Oct. 2006Users and providers of an information system should clearly unde...
Users and providers of an information system should clearly understand the threats caused by the sys...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
SUMMARY We propose a method for analyzing trade-off between an environment where a Java mobile code ...
RE 2003, Monterey Bay, California, Sep. 2003ArticleProceedings : 11th IEEE International Requirement...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
With the large number of mobile applications being developed and used, the mobile application securi...
Mobile applications (mobile apps) are becoming a common medium for conducting transaction, saving da...
This dissertation presents a novel security architecture called security-passing style and motivates...
Java is a popular programming language designed by Sun Microsystems and used for desktop application...
Next generation mobile networks and services are gaining market momentum every day. Service provider...
Research Article published by Scientific Publishing CenterAs the use of web and mobile applications ...
QSIC 2006, Beijing, China, Oct. 2006Users and providers of an information system should clearly unde...
Users and providers of an information system should clearly understand the threats caused by the sys...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
SUMMARY We propose a method for analyzing trade-off between an environment where a Java mobile code ...
RE 2003, Monterey Bay, California, Sep. 2003ArticleProceedings : 11th IEEE International Requirement...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
With the large number of mobile applications being developed and used, the mobile application securi...
Mobile applications (mobile apps) are becoming a common medium for conducting transaction, saving da...
This dissertation presents a novel security architecture called security-passing style and motivates...
Java is a popular programming language designed by Sun Microsystems and used for desktop application...
Next generation mobile networks and services are gaining market momentum every day. Service provider...
Research Article published by Scientific Publishing CenterAs the use of web and mobile applications ...