By Topic

Towards data centric mobile security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ali Dehghantanha ; Faculty of Computer Science and Information Technology, University Putra Malaysia ; Nur Izura Udzir ; Ramlan Mahmod

Recently the usage of mobile devices has increased rapidly and it will be growing even more as mobile devices functionality is at enhanced. So the security of mobile devices needs to be improved. This paper discusses various components and functions of mobile devices such as SMS, wireless and applications and describes possible vulnerabilities threatening them precisely. Malware threats are explained and their effects on mobile devices are studied. Finally, to protect all the vulnerabilities and prevent application and malware threats, data-centric security model is provided as a solution to ensure confidentiality, integrity and availability of data stored on mobile devices.

Published in:

Information Assurance and Security (IAS), 2011 7th International Conference on

Date of Conference:

5-8 Dec. 2011