The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile cloud computing has been introduced to be a powerful technology for mobile services by combining mobile computing and cloud computing technology. Though, a direct integration of two technologies can overcome a many of hurdles related to the performance, flexibility, security, and dynamic management discussed in mobile computing. Mobile cloud computing can address these problems by executing...
As mobile communication technology evolves, more and more features are available to users of mobile devices. The adoption of such features is rapid and the demand for more capabilities is growing, especially with the development of the Internet of Things. One of the most challenging and sensitive concepts used in the always connected mobile world is mobile commerce. Security for mobile financial transactions...
Emerging technologies are transforming the workflows in pervasive healthcare enterprises. Pervasive Healthcare is a one of the developing technology within the pervasive computing paradigm. The presence of pervasive computing, consisting of wireless network gives innovative medium for data transmission of medical applications. We currently use a various wireless technology in healthcare domain. In...
An agile, lightweight, but secure extensible hybrid application container and deployment mechanism for mobile devices has the potential to provide improved cross platform support, reduced development lifecycle time and a consistent application security model within large organizations. We demonstrate how such an architecture can provide a set of security and mobile device management interfaces to...
The 4w project has demonstrated the feasibility of a prospective memory support systems based on a mobile client and an ontology based server side reasoning engine. However, the experiments also showed that the level of efficiency of the system was largely dependent on the precision and richness of the ontology used to autonomously identify the places where users may efficiently perform their tasks...
Recently, there emerge a variety of clouds in sky and thus, several similar cloud services (from different cloud venders) can be provided to a mobile end device. The goal of cloud-path selection is to find an optimal cloud among a certain class of clouds that provide the same service, in order to carry out the offloaded computation tasks. It is easy to choose the optimal cloud to save execution time...
Mobile devices are now well integrated with advanced capabilities and technologies such as the Internet. Today, mobile security has become a globally critical issue due to the high usage of mobile devices, their convenience and mobility. However, they are not properly protected compared to computer and computer networks, and the users pay less attention to the security updates. Recently, mobile devices...
With the rapid deployment of M2M services, countless smart “things” with sensing and communication capabilities are collecting data about the physical world we live in. These data can be used by various service providers to make their services more customized with high quality. On the other hand the availability of personal information raises serious concerns over individual privacy. In order to prevent...
The proliferation of smart phones inside enterprises and the number of enterprise apps (applications) available for various smart phone platforms has been increasing. This trend is expected to continue as smart phones tend to become the device of choice to access both enterprise and personal data. Making enterprise sensitive data accessible on smart phones requires that adequate protection mechanisms...
Due to the widespread adoption and use of handheld mobile devices, the application of mobile technologies in enhancing learning activities has attracted noteworthy research interest. This paper presents an attempt to exploit mobile technologies to simplify the exam management and performance assessment activities of a learning process. The work focuses on key aspects of mobile device and platform...
The increasing adoption of mobile communication through SMS (Short Message Service) messages by young people, has attracted pedophiles to perform sexual exploitation attacks. Artemis is an Android application that aims to protect minors by recognizing such attacks using advanced classification techniques. In case of high exploitation risk, a warning signal is sent to the designated parent who is responsible...
Measurement data collected from hardware systems using a mobile application needs to be protected from falling into malicious hands. To circumvent security concerns, many sensitive ATE systems are simply isolated from networks and run in stand-alone environments. Using mobile connections with ATE equipment introduces a whole new level of security issues which can be a large concern for many companies...
We proposed an improved 3GPP system and WLAN interworking network architecture by adding a management server in current architecture. This paper described the switchover process, the function of management server (MS). It analysed the security, load balance, manageability and robustness.
The cloud-based solutions can be also applied on e-Health services. To analyze it we have researched several publications about the implementation of some e-Health services based on the Cloud mainly through Medline. In this paper, concepts of Cloud Computing and mobile health records systems are explained. Moreover, the benefits, constraints, issues and requisites of a Mobile Health Record System...
With the advent of smart phones push services become increasingly important. Unfortunately, each smart phone platform uses a different push technology. In this paper the most popular push technologies for mobile devices will be analyzed with respect to their technologies, security features and functional aspects. Finally, a universal push system approach is presented which provides a uniform interface...
This paper aims at presenting an architectural model proposal for a novel Mobile Payment System, called 4iPay. This work considers the following premises: independence of device, location, carrier and cardholder to meet the needs of executing payment transactions in ubiquitous commerce. Our proposal considers the convergence of concepts of ubiquity, unity, universality and unison to form the proposed...
Recently, according to the emerging development of smart mobile phones and tablet PC, mobile e-commerce has dramatically increased due to the reason that the function of smart mobile phone and tablet PC are combined together. M-banking is thus become more convenient, effective and timely through the new mobile communication systems. In order to raise the security of M-banking, some banks adopt the...
The emergence of mobile P2P systems is largely due to the evolution of mobile devices into powerful information processing units. The relatively structured context that results from the mapping of mobile patterns of behaviour onto P2P models is however constrained by the vulnerabilities of P2P networks and the inherent limitations of mobile devices. Whilst the implementation of P2P models gives rise...
The modern mobile ubiquitous computing environment, with reasonable connectivity, processing power and sensing capabilities on portable devices, present applications and services with the opportunity to be truly context-aware. But building context-aware applications has large development overheads due to complexities of sensing, aggregating and inferencing context information. To reduce the developers'...
With the proliferation of digital contents and the expanding variety of connected and IP-enabled consumer electronics (CE) devices, consumers are increasingly seeking ways to efficiently integrate their mobile devices with home networked devices. Expanding wireless coverage is enabling exciting new set of consumer-focused applications between CE devices, mobile handsets, home appliances and personal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.