Security is the key issue that needs to be considered, which comes into picture once. The communication channel is set up. This paper provides an insight on threats, challenges and recent trends security issues in mobile computing.Sangeeta Rani
We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues. Introduction The mobile computing is the fast-growing business solution in the field of Information and Communications Technology (ICT...
Jangwal, "Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment," IJCER, vol. 1, pp. 58-67, 2012.Swarnpreet Singh, Ritu Bagga, Devinder Singh, Tarun Jangwal. "Architecture Of Mobile Application, Security Issues And Services Involved In ...
in MANET is a very complex job and requires considerations on the issues spanning across all the layers of communication stack. This chapter reviews the security problem in MANET. It provides an updated account of the security solutions for MANET with detailed discussions on secure routing, ...
Security comparison and performance-related issues are discussed in Section 7. Finally, we draw a conclusion in Section 8. Access through your organization Check access to the full text by signing in through your organization. Access through your organization ...
Modern security tools can cover all sorts of devices, but mobile devices present threat vectors, privacy issues and security challenges that aren't common elsewhere. For example, device loss and theft can occur much easier with mobile devices than with PCs. Find out what considerations IT must ...
mobile, wireless, and distributed computing environments. Consequently, the imperative is to construct systems and networks that enable users to access more comprehensive services while concurrently upholding trust, security, and privacy. In response to this challenge, trusted computing and communications ha...
There are still significant security challenges in the development of cloud infrastructure, web, and mobile terminal devices. This special issue addresses various security issues in social networking, web, and cloud computing, particularly on advances in mobile computing technologies and related areas [3...
Section 2 provides the architectural framework of the cloud computing. The security issues in the cloud computing paradigm are detailed in Section 3 whereas the existing solutions in the contemporary literature are presented in Section 4. Section 5 highlights the security concerns in the mobile cloud...
In an attempt to find a solution to security issues in EHR, the duo of Garcia-Morchon and Wehrle developed a fine-grained access control for ubiquitous healthcare electronic applications. The framework enhances the existing traditional RBAC security model for two purposes. It explores it to alloca...