In these last years, mobile devices, such as mobile phones or Personal Digital Assistants, became very popular among people. Moreover, mobile devices became also very powerful, and most of them are also able to execute applications, such as games, Internet browsers, e-mail clients, and so on. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as the contact list). This chapter describes the approaches that have been proposed in scientific literature to guarantee the security of mobile devices.

Application Security for Mobile Devices

Mori P;Martinelli F;Lazouski A;
2011

Abstract

In these last years, mobile devices, such as mobile phones or Personal Digital Assistants, became very popular among people. Moreover, mobile devices became also very powerful, and most of them are also able to execute applications, such as games, Internet browsers, e-mail clients, and so on. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as the contact list). This chapter describes the approaches that have been proposed in scientific literature to guarantee the security of mobile devices.
2011
Istituto di informatica e telematica - IIT
Inglese
L. Petre, K. Sere, and E. Troubitsyna
Dependability and Computer Engineering: Concepts for Software-Intensive Systems
1
17
1609607473
IGI Global
Hershey
STATI UNITI D'AMERICA
Mobile devices
mobile phones
Personal Digital Assistants
ID_PUMA: cnr.iit/2011-A1-006
3
02 Contributo in Volume::02.01 Contributo in volume (Capitolo o Saggio)
268
none
Mori P. ; Martinelli F. ; Lazouski A. ; Costa G.
info:eu-repo/semantics/bookPart
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/454182
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact