2013 European Modelling Symposium 2013
DOI: 10.1109/ems.2013.89
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Mobile Computing Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…It has its own Androidbased operating system, called PrivatOS, which includes a privacy-focused application store (called Silent Store) that takes care of the problem of applications which ask for certain permissions that can lead, for instance, to personal data leakage [11]. This BlackPhone also allows a remote wiping of the data if the device is lost or stolen.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…It has its own Androidbased operating system, called PrivatOS, which includes a privacy-focused application store (called Silent Store) that takes care of the problem of applications which ask for certain permissions that can lead, for instance, to personal data leakage [11]. This BlackPhone also allows a remote wiping of the data if the device is lost or stolen.…”
Section: State Of the Artmentioning
confidence: 99%
“…In addition, security threats have evolved too [11], so that new security measures have to be adopted every time ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.…”
Section: Introductionmentioning
confidence: 99%
“…It has its own Androidbased operating system, called PrivatOS (40), which includes a privacy-focused application store, called Silent Store, that takes care of the problem of applications which ask for certain permissions that can lead, for instance, to personal data leakage (3). BlackPhone also allows a remote wiping of the data if the device is lost or stolen.…”
Section: Blackphonementioning
confidence: 99%
“…But data security and privacy are key factors for a company, and thus, in order to protect them, it is usual that the Chief Security Officer (CSO) of a company defines a set of Organizational Security Policies (2); allowing a BYOD environment implies taking care of the risks that the use of personal devices can bring to the company (3). For instance, the mixture between personal and professional information in these devices would allow the user to navigate inside social networks, where important data could be leaked in the event of a security incident.…”
Section: Introductionmentioning
confidence: 99%
“…Mobile protection is an environment which has not been provided much consideration by smartphone users to date [2]. That's evolving now, though, because of a number of reasons that exist in the smartphone industry.…”
Section: Introductionmentioning
confidence: 99%