Browsing by Subject "Mobile security"
Now showing items 1-3 of 3
-
Conference Object
Human Mobility Computing and Privacy: Fad or Reality?
(Institute of Electrical and Electronics Engineers Inc., 2015)The advent of mobile computing and sensing technologies, in conjunction with omni-present and high-speed mobile networks, allow nowadays the capture of human mobility data at an extremely high fidelity. Modern mobile ...
-
Conference Object
Opacity formulations and verification in discrete event systems
(Institute of Electrical and Electronics Engineers Inc., 2014)In many emerging security applications, a property of a system, that may reveal important details about its behaviour, needs to be kept secret (opaque) to outside observers (intruders). Motivated by such applications, ...
-
Article
Using argumentation logic for firewall policy specification and analysis
(2006)Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that ...