메뉴 건너뛰기




Volumn 33, Issue 5, 2010, Pages 569-587

Adaptive security protocol selection for mobile computing

Author keywords

Adaptive computing; Autonomous computing; Data semantics; Mobile computing; Security

Indexed keywords

ADAPTIVE COMPUTING; ADAPTIVE SECURITY; APPLICATION DEVELOPERS; AUTONOMOUS COMPUTING; COMMUNICATION PROTOCOLS; CRYPTOGRAPHIC PRIMITIVES; DATA SEMANTICS; HARDWARE RESOURCES; MOBILE USERS; PERFORMANCE GAIN; QOS GUARANTEE; QOS METRICS; RESOURCE LIMITATIONS; SECURITY LEVEL; SECURITY PROTOCOLS; SECURITY REQUIREMENTS; SECURITY SERVICES; SECURITY SOLUTIONS; STATIC SECURITY; SYSTEM RESOURCES; WIRELESS CHANNEL; WIRELESS MEDIUM;

EID: 77955413100     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.03.028     Document Type: Article
Times cited : (16)

References (34)
  • 1
    • 0042063842 scopus 로고    scopus 로고
    • Wireless security is different
    • ISSN 0018-9162. doi:
    • W.A. Arbaugh Wireless security is different Computer 36 8 2003 99 101 ISSN 0018-9162. doi: http://dx.doi.org/10.1109/MC.2003.1220591
    • (2003) Computer , vol.36 , Issue.8 , pp. 99-101
    • Arbaugh, W.A.1
  • 4
    • 63049091681 scopus 로고    scopus 로고
    • From desktop to mobile: Examining the security experience
    • R.A. Botha, S.M. Furnell, and N.L. Clarke From desktop to mobile: examining the security experience Computers & Security 28 34 2009 130 137
    • (2009) Computers & Security , vol.28 , Issue.34 , pp. 130-137
    • Botha, R.A.1    Furnell, S.M.2    Clarke, N.L.3
  • 7
    • 0242579167 scopus 로고    scopus 로고
    • Carisma: Context-aware reflective middleware system for mobile applications
    • L. Capra, W. Emmerich, and C. Mascolo Carisma: context-aware reflective middleware system for mobile applications IEEE Transactions on Software Engineering 29 10 October 2003 929 945
    • (2003) IEEE Transactions on Software Engineering , vol.29 , Issue.10 , pp. 929-945
    • Capra, L.1    Emmerich, W.2    Mascolo, C.3
  • 8
    • 33745149251 scopus 로고    scopus 로고
    • A context-centric security middleware for service provisioning in pervasive computing
    • Washington, DC, USA: IEEE Computer Society ISBN 0-7695-2262-9. doi: http://dx.doi.org/10.1109/SAINT.2005.2
    • Corradi A, Montanari R, Tibaldi D, Toninelli A. A context-centric security middleware for service provisioning in pervasive computing. In: Proceedings of the 2005 symposium on applications and the internet (SAINT'05), Washington, DC, USA: IEEE Computer Society; 2005. p. 421429. ISBN 0-7695-2262-9. doi: http://dx.doi.org/10.1109/SAINT.2005.2.
    • (2005) Proceedings of the 2005 Symposium on Applications and the Internet (SAINT'05) , pp. 421-429
    • Corradi, A.1    Montanari, R.2    Tibaldi, D.3    Toninelli, A.4
  • 10
  • 11
    • 69249229584 scopus 로고    scopus 로고
    • Secure network coding for wireless mesh networks: Threats, challenges, and directions
    • ISSN 0140-3664. doi:
    • J. Dong, R. Curtmola, and C. Nita-Rotaru Secure network coding for wireless mesh networks: threats, challenges, and directions Computer Communications 32 17 2009 1790 1801 ISSN 0140-3664. doi: http://dx.doi.org/10. 1016/j.comcom.2009.07.010
    • (2009) Computer Communications , vol.32 , Issue.17 , pp. 1790-1801
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3
  • 13
    • 0026137432 scopus 로고
    • Mpeg: A video compression standard for multimedia applications
    • ISSN 0001-0782. doi:
    • D. Le Gall Mpeg: a video compression standard for multimedia applications Communications of the ACM 34 4 1991 46 58 ISSN 0001-0782. doi: http://doi.acm.org/10.1145/103085.103090
    • (1991) Communications of the ACM , vol.34 , Issue.4 , pp. 46-58
    • Le Gall, D.1
  • 15
    • 84947248224 scopus 로고    scopus 로고
    • Sequential abstract-state machines capture sequential algorithms
    • ISSN 1529-3785. doi:
    • Y. Gurevich Sequential abstract-state machines capture sequential algorithms ACM Transactions on Computational Logic 1 1 2000 77 111 ISSN 1529-3785. doi: http://doi.acm.org/10.1145/343369.343384
    • (2000) ACM Transactions on Computational Logic , vol.1 , Issue.1 , pp. 77-111
    • Gurevich, Y.1
  • 16
    • 77955412458 scopus 로고    scopus 로고
    • Karygiannis T, Owens L. Wireless network security: 802.11, Bluetooth, and handheld devices. NIST, July 2002
    • Karygiannis T, Owens L. Wireless network security: 802.11, Bluetooth, and handheld devices. NIST, July 2002. doi: http://csrc.nist.gov/publications/ drafts.html.
  • 17
    • 18844368010 scopus 로고    scopus 로고
    • Intellectual property management on mpeg-4 video for hand-held device and mobile video streaming service
    • ISSN 0098-3063. doi:
    • G. Kim, D. Shin, and D. Shin Intellectual property management on mpeg-4 video for hand-held device and mobile video streaming service IEEE Transactions on Consumer Electronics 51 1 February 2005 139 143 ISSN 0098-3063. doi: 10.1109/TCE.2005.1405711
    • (2005) IEEE Transactions on Consumer Electronics , vol.51 , Issue.1 , pp. 139-143
    • Kim, G.1    Shin, D.2    Shin, D.3
  • 18
    • 34247339387 scopus 로고    scopus 로고
    • Securing wireless systems via lower layer enforcements
    • DOI 10.1145/1161289.1161297, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
    • Li Z, Xu W, Miller R, Trappe W. Securing wireless systems via lower layer enforcements. In: Proceedings of the fifth ACM workshop on wireless security (WiSe'06), New York, NY, USA: ACM Press; 2006. p. 3342. ISBN 1-59593-557-6. doi: http://doi.acm.org/10.1145/1161289.1161297. (Pubitemid 46634300)
    • (2006) WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security , vol.2006 , pp. 33-42
    • Zang, L.1    Wenyuan, X.2    Miller, R.3    Trappe, W.4
  • 20
    • 0036282017 scopus 로고    scopus 로고
    • XMIDDLE: A data-sharing middleware for mobile computing
    • DOI 10.1023/A:1015584805733
    • C. Mascolo, L. Capra, S. Zachariadis, and W. Emmerich Xmiddle: a data-sharing middleware for mobile computing Wireless Personal Communications 21 1 2002 77 103 ISSN 0929-6212. doi: http://dx.doi.org/10.1023/A:1015584805733 (Pubitemid 34630509)
    • (2002) Wireless Personal Communications , vol.21 , Issue.1 , pp. 77-103
    • Mascolo, C.1    Capra, L.2    Zachariadis, S.3    Emmerich, W.4
  • 21
    • 0040288669 scopus 로고    scopus 로고
    • Cryptographic security techniques for wireless networks
    • D. Patiyoot, and S.J. Shepherd Cryptographic security techniques for wireless networks ACM SIGOPS Operating Systems Review 33 2 1999 36 50 ISSN 0163-5980. doi: http://doi.acm.org/10.1145/311094.311104 (Pubitemid 129545451)
    • (1999) Operating Systems Review (ACM) , vol.33 , Issue.2 , pp. 36-50
    • Patiyoot, D.1    Shepherd, S.J.2
  • 23
    • 33745922391 scopus 로고    scopus 로고
    • Wireless hotspots: Petri dish of wireless security
    • ISSN 0001-0782. doi:
    • B. Potter Wireless hotspots: petri dish of wireless security Communications of the ACM 49 6 2006 50 56 ISSN 0001-0782. doi: http://doi.acm.org/10.1145/1132469.1132501
    • (2006) Communications of the ACM , vol.49 , Issue.6 , pp. 50-56
    • Potter, B.1
  • 24
    • 0036957308 scopus 로고    scopus 로고
    • Securing wireless data: System architecture challenges
    • New York, NY, USA: ACM Press ISBN 1-58113-576-9. doi: http://doi.acm.org/10.1145/581199.581243
    • Ravi S, Raghunathan A, Potlapally N. Securing wireless data: system architecture challenges. In: Proceedings of the 15th international symposium on system synthesis (ISSS'02), New York, NY, USA: ACM Press; 2002. p. 195200. ISBN 1-58113-576-9. doi: http://doi.acm.org/10.1145/581199.581243.
    • (2002) Proceedings of the 15th International Symposium on System Synthesis (ISSS'02) , pp. 195-200
    • Ravi, S.1    Raghunathan, A.2    Potlapally, N.3
  • 26
    • 77955432080 scopus 로고    scopus 로고
    • RSA Security. Wireless Adoption Leaps Ahead, Advanced Encryption Gains Ground in the Post-WEP Era. Press release, June 2007
    • RSA Security. Wireless Adoption Leaps Ahead, Advanced Encryption Gains Ground in the Post-WEP Era. Press release, June 2007. 〈 http://www.rsa.com/press-release.aspx?id=8451 〉.
  • 27
  • 29
    • 32144462991 scopus 로고    scopus 로고
    • Application of synchronous dynamic encryption system in mobile wireless domains
    • DOI 10.1145/1089761.1089766, Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
    • Soliman HS, Omari M. Application of synchronous dynamic encryption system in mobile wireless domains. In: Proceedings of the first ACM international workshop on quality of service & security in wireless and mobile networks (Q2SWinet'05), New York, NY, USA: ACM Press; 2005. p. 2430. ISBN 1-59593-241-0. doi: http://doi.acm.org/10.1145/1089761.1089766. (Pubitemid 43206618)
    • (2005) Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks , pp. 24-30
    • Soliman, H.S.1    Omari, M.2
  • 30
    • 77349091593 scopus 로고    scopus 로고
    • Access and service convergence over the mobile interneta survey
    • 10.1016/j.comnet.2009.08.017
    • P. TalebiFard, T. Wong, and V.C.M. Leung Access and service convergence over the mobile interneta survey Computer Networks 54 4 2010 545 557 10.1016/j.comnet.2009.08.017 ISSN 1389-1286. Advances in Wireless and Mobile Networks
    • (2010) Computer Networks , vol.54 , Issue.4 , pp. 545-557
    • Talebifard, P.1    Wong, T.2    Leung, V.C.M.3
  • 32
    • 0042417066 scopus 로고    scopus 로고
    • Challenges designing next-generation middleware systems
    • ISSN 0001-0782. doi:
    • A. Tripathi Challenges designing next-generation middleware systems Communications of the ACM 45 6 2002 39 42 ISSN 0001-0782. doi: http://doi.acm.org/10.1145/508448.508471
    • (2002) Communications of the ACM , vol.45 , Issue.6 , pp. 39-42
    • Tripathi, A.1
  • 33
    • 77955424759 scopus 로고    scopus 로고
    • Wiktionary. Wiktionary, January 2009
    • Wiktionary. Wiktionary, January 2009. 〈 http://en.wiktionaty.org 〉.
  • 34
    • 78751644528 scopus 로고    scopus 로고
    • Scheduling security-critical multimedia applications in heterogeneous networks
    • press. ISSN 0140-3664. doi: 10.1016/j.comcom.2010.01.009.To appear
    • Zhou L, Vasilakos AV, Xiong N, Zhang Y, Lian S. Scheduling security-critical multimedia applications in heterogeneous networks. Computer Communications, in press. ISSN 0140-3664. doi: 10.1016/j.comcom.2010.01.009. To appear.
    • Computer Communications
    • Zhou, L.1    Vasilakos, A.V.2    Xiong, N.3    Zhang, Y.4    Lian, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.