Advances in Information Security Management & Small Systems Security

@inproceedings{Eloff2001AdvancesII,
  title={Advances in Information Security Management & Small Systems Security},
  author={Jan H. P. Eloff and Gurpreet Dhillon},
  booktitle={IFIP International Federation for Information Processing},
  year={2001}
}
This paper describes a framework that can be used to identify security requirements for a specific mobile environment. The model includes three dimensions: mobile users, mobile hardware and mobile software. The analysis of the three dimensions can determine the characteristics of the specific implementation and needed security measures. Specific security measures for mobile hardware, mobile users and mobile software are also discussed. Security, Mobility, Mobile Agents, Mobile Computers… CONTINUE READING

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 11 references

The Social and Technical Effects of Introducing Groupware into the Educational Environment

A. Hogarth, J. Biggam
Proceedings of the ACM/OCG Conference on Educational Information and Communication Technology (EDICT • 2000
View 1 Excerpt

Users Are Not The Enemy

Commun. ACM • 1999
View 1 Excerpt

SPEAR: Security Protocol Engineering and Analysis Resources

J. P. Beckmann, P. De Goede, A.C.M. Hutchison
In DIMACS Workshop on Design and Formal Verification of Security Protocols • 1997
View 1 Excerpt

Soft Systems Methodology in Action

P. B. Checkland, J. Scholes
1991
View 2 Excerpts

A Logic of Authentication

ACM Trans. Comput. Syst. • 1990
View 2 Excerpts

SSADM A Practical Approach. McGraw-Hill International Series in Software Engineering, London

C. Ashworth, M. Goodland
1990
View 1 Excerpt

Similar Papers

Loading similar papers…