http://www.cnr.it/ontology/cnr/individuo/prodotto/ID29981
Enhancing Java ME Security Support with Resource Usage Monitoring (Contributo in atti di convegno)
- Type
- Label
- Enhancing Java ME Security Support with Resource Usage Monitoring (Contributo in atti di convegno) (literal)
- Anno
- 2008-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1007/978-3-540-88625-9_17 (literal)
- Alternative label
[1] A. Castrucci, [1] F. Martinelli, [1] P. Mori, [1] F. Roperti (2008)
Enhancing Java ME Security Support with Resource Usage Monitoring
in 10th International Conference on Information and Communications Security (ICICS '08), Birmingham, UK, 20-22 October 2008
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- [1] A. Castrucci, [1] F. Martinelli, [1] P. Mori, [1] F. Roperti (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#volumeInCollana
- Rivista
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Note
- Scopu (literal)
- ISI Web of Science (WOS) (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- [1] IIT-CNR, Pisa, Italy (literal)
- Titolo
- Enhancing Java ME Security Support with Resource Usage Monitoring (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
- 978-3-540-88624-2 (literal)
- Abstract
- Both the spreading and the capabilities of mobile devices have dramatically
increased over the last years. Nowadays, many mobile devices are able to run Java applications, that can create Internet connections, send SMS messages, and perform other expensive or dangerous operations on the mobile device. Hence, an adequate security support is required to meet the needs of this new and evolving scenario.
This paper proposes an approach to enhance the security support of Java Micro Edition, based on the monitoring of the usage of mobile device resources performed by MIDlets. A process algebra based language is used to define the security policy and a reference monitor based architecture is exploited to monitor the resource usage. The paper also presents the implementation of a prototype running on a real mobile device, along with some preliminary performance evaluation. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
- Insieme di parole chiave di