MULTILATERAL SECURITY CONSIDERATIONS FOR ADAPTIVE MOBILE APPLICATIONS
Adrian Spalka, Armin B. Cremers, Marcel Winandy
2005
Abstract
Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality. But to make this technology a success, the security of all concerned parties must be addressed. This work presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party’s role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments.
References
- M ügge, H., Rho, T., Winandy, M., Won, M., Cremers, A. B., Costanza, P., and Englert, R. (2005). Towards Context-Sensitive Intelligence. In Proceedings of EWSA 2005, LNCS Vol. 3527. Springer.
- Prasad, A., Wang, H., and Schoo, P. (2003). Network Operator's Security Requirements on Systems Beyond 3G. In Proceedings of WWRF 8. Wireless World Research Forum.
- Rannenberg, K. (2000). Multilateral Security - A Concept and Examples for Balanced Security. In Proceedings of the 2000 Workshop on New Security Paradigms (NSPW 7800), pages 151-162. ACM Press.
Paper Citation
in Harvard Style
Spalka A., Cremers A. and Winandy M. (2005). MULTILATERAL SECURITY CONSIDERATIONS FOR ADAPTIVE MOBILE APPLICATIONS . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE, ISBN 972-8865-33-3, pages 133-137. DOI: 10.5220/0001420101330137
in Bibtex Style
@conference{icete05,
author={Adrian Spalka and Armin B. Cremers and Marcel Winandy},
title={MULTILATERAL SECURITY CONSIDERATIONS FOR ADAPTIVE MOBILE APPLICATIONS},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE,},
year={2005},
pages={133-137},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001420101330137},
isbn={972-8865-33-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE,
TI - MULTILATERAL SECURITY CONSIDERATIONS FOR ADAPTIVE MOBILE APPLICATIONS
SN - 972-8865-33-3
AU - Spalka A.
AU - Cremers A.
AU - Winandy M.
PY - 2005
SP - 133
EP - 137
DO - 10.5220/0001420101330137