Security and Privacy in Mobile Cloud Under a Citizen’s Perspective

作者: Dimitris Geneiatakis , Ioannis Kounelis , Jan Loeschner , Igor Nai Fovino , Pasquale Stirparo

DOI: 10.1007/978-3-642-41205-9_2

关键词:

摘要: Cloud usage has become a reality in users’ everyday habits (even if sometimes unconsciously), and security privacy issues this context have already been subject of consideration by scientific, business policy-makers communities. However, the increasing use mobile phones, and, generally speaking smart devices, to access Cloud, introduced recently area concept Mobile Cloud. Scope paper is address aspects cloud phenomenon, under citizen perspective, taking as driving example commercial transactions.

参考文章(18)
Функ Кристиан, Гарнаева Мария Александровна, Kaspersky security Bulletin 2013 Вопросы кибербезопасности. ,(2014)
Scott Fluhrer, Itsik Mantin, Adi Shamir, Weaknesses in the Key Scheduling Algorithm of RC4 selected areas in cryptography. pp. 1- 24 ,(2001) , 10.1007/3-540-45537-X_1
Elad Barkan, Eli Biham, Nathan Keller, Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication Advances in Cryptology - CRYPTO 2003. pp. 600- 616 ,(2003) , 10.1007/978-3-540-45146-4_35
U. Meyer, S. Wetzel, On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks personal, indoor and mobile radio communications. ,vol. 4, pp. 2876- 2883 ,(2004) , 10.1109/PIMRC.2004.1368846
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David Wagner, Android permissions: user attention, comprehension, and behavior symposium on usable privacy and security. pp. 3- ,(2012) , 10.1145/2335356.2335360
Federico Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero, A fast eavesdropping attack against touchscreens information assurance and security. pp. 320- 325 ,(2011) , 10.1109/ISIAS.2011.6122840
Alexandre Bartel, Jacques Klein, Yves Le Traon, Martin Monperrus, Automatically securing permission-based software by reducing the attack surface: an application to Android Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering - ASE 2012. pp. 274- 277 ,(2012) , 10.1145/2351676.2351722
Daniel Schreckling, Johannes Köstler, Matthias Schaff, Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android Information Security Technical Report. ,vol. 17, pp. 71- 80 ,(2013) , 10.1016/J.ISTR.2012.10.006
Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, David Wagner, A survey of mobile malware in the wild Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 3- 14 ,(2011) , 10.1145/2046614.2046618