In these last years, mobile devices, such as mobile phones or Personal Digital Assistants, became very popular among people. Moreover, mobile devices became also very powerful, and most of them are also able to execute applications, such as games, Internet browsers, e-mail clients, and so on. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as the contact list). This chapter describes the approaches that have been proposed in scientific literature to guarantee the security of mobile devices.

Application Security for Mobile Devices

Mori P;Martinelli F;Lazouski A;
2011

Abstract

In these last years, mobile devices, such as mobile phones or Personal Digital Assistants, became very popular among people. Moreover, mobile devices became also very powerful, and most of them are also able to execute applications, such as games, Internet browsers, e-mail clients, and so on. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as the contact list). This chapter describes the approaches that have been proposed in scientific literature to guarantee the security of mobile devices.
2011
Istituto di informatica e telematica - IIT
1609607473
Mobile devices
mobile phones
Personal Digital Assistants
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/454182
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact