Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device


The KIPS Transactions:PartC, Vol. 16, No. 6, pp. 691-698, Dec. 2009
10.3745/KIPSTC.2009.16.6.691,   PDF Download:

Abstract

A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
G. I. An, K. Y. Kim, D. I. Seo, "Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device," The KIPS Transactions:PartC, vol. 16, no. 6, pp. 691-698, 2009. DOI: 10.3745/KIPSTC.2009.16.6.691.

[ACM Style]
Gae Il An, Ki Young Kim, and Dong Il Seo. 2009. Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device. The KIPS Transactions:PartC, 16, 6, (2009), 691-698. DOI: 10.3745/KIPSTC.2009.16.6.691.