In these last years, mobile devices, such as mobile phones or Personal Digital Assistants, became very popular among people. Moreover, mobile devices became also very powerful, and most of them are also able to execute applications, such as games, Internet browsers, e-mail clients, and so on. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as the contact list). This chapter describes the approaches that have been proposed in scientific literature to guarantee the security of mobile devices.

Application Security for Mobile Devices

Lazouski A;Martinelli F;Mori P
2012

Abstract

In these last years, mobile devices, such as mobile phones or Personal Digital Assistants, became very popular among people. Moreover, mobile devices became also very powerful, and most of them are also able to execute applications, such as games, Internet browsers, e-mail clients, and so on. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as the contact list). This chapter describes the approaches that have been proposed in scientific literature to guarantee the security of mobile devices.
2012
Istituto di informatica e telematica - IIT
Inglese
L. Petre, K. Sere, and E. Troubitsyna
Dependability and Computer Engineering: Concepts for Software-Intensive Systems
266
284
19
978-1-60960-747-0
IGI Global
Hershey
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
security
mobile devices
4
02 Contributo in Volume::02.01 Contributo in volume (Capitolo o Saggio)
268
none
Costa, G; Lazouski, A; Martinelli, F; Mori, P
info:eu-repo/semantics/bookPart
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/314752
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? 1
social impact