2020
DOI: 10.1109/tetc.2018.2791459
|View full text |Cite
|
Sign up to set email alerts
|

Classification and Mapping of Adaptive Security for Mobile Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9

Relationship

4
5

Authors

Journals

citations
Cited by 19 publications
(18 citation statements)
references
References 20 publications
0
18
0
Order By: Relevance
“…The applications of context-aware IoTs can range from agent-based systems for smart city systems including but not limited to smart traffic management, smart healthcare, recommender systems and home service autonomous and adaptive agents [24]. However, in the context of mobile-driven context-aware systems, security and privacy of user data and device information are of prime importance [20].…”
Section: Trend Ii: Context-aware Iot Architecturesmentioning
confidence: 99%
“…The applications of context-aware IoTs can range from agent-based systems for smart city systems including but not limited to smart traffic management, smart healthcare, recommender systems and home service autonomous and adaptive agents [24]. However, in the context of mobile-driven context-aware systems, security and privacy of user data and device information are of prime importance [20].…”
Section: Trend Ii: Context-aware Iot Architecturesmentioning
confidence: 99%
“…Specifically, a mobile device acts as a backbone of mobile computing and it represents any (hand-held) equipment or machine that allows its user to perform computation, information sharing, and other relevant activities in a portable fashion, as in Figure 1a. Despite these benefits, there are some critical challenges such as resource scarcity including the processing, storage, energy deficiency, and issues like data security and privacy that needs to be addressed [1,2,18]. Software architecture proved successful in abstracting the complexities of source code modules by representing them as architectural components, whereas the interaction or calls between the modules are represented as the component connectors.…”
Section: Software Architecture For Mobile Cloud Computing Systemsmentioning
confidence: 99%
“…In a survey-based study [20], the authors review the state of the art for MCC technology and its applicability in various domains such as mobile learning, commerce, health, and social media [20]. The authors have also identified the gaps in the existing research that relate to efficient task distribution and data offloading along with security and privacy aspects of the MCC systems [18]. In a similar study, the authors present an overview and a taxonomy of the building blocks for the MCC systems [21].…”
Section: State Of the Art And Open Challenges For MCC Systemsmentioning
confidence: 99%
“…There is a body of research carried to support secure mobile computing [34] in general and Android systems security [13,14], in particular. In this section, we highlight the most relevant research related to ICC that is focused on application failures and security issues involving intents.…”
Section: Related Workmentioning
confidence: 99%