Mobile Computing Security: Issues and Requirements
نویسندگان
چکیده
منابع مشابه
Security Issues in Mobile Computing
In the present mobile communication environment, lot of research is going on, to improve the performance of issues like handoffs, routing etc. Security is another key issue that needs to be considered, which comes into picture once the communication channel is setup. Many security protocols are being proposed for different applications like Wireless Application Protocol, 802.11 etc. most of the...
متن کاملSecurity for Mobile Agents: Issues and Requirements
Mobile agents are processes which can autonomously migrate to new hosts. Despite its many practical bene ts, mobile agent technology results in signi cant new security threats frommalicious agents and hosts. The primary added complication is that, as an agent traverses multiple hosts that are trusted to di erent degrees, its state can change in ways that adversely impact its functionality. In t...
متن کاملData Security Issues & Requirements in Cloud Computing
The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on management and ownership of data. To establish the client’s trust in cloud services, we stil...
متن کاملData Security Issues & Requirements in Cloud Computing
The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on management and ownership of data. To establish the client’s trust in cloud services, we stil...
متن کاملData Security Issues & Requirements in Cloud Computing
The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on management and ownership of data. To establish the client’s trust in cloud services, we stil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Advances in Information Technology
سال: 2016
ISSN: 1798-2340
DOI: 10.12720/jait.7.1.8-12