Secure mobile business applications – framework, architecture and implementation
✍ Scribed by Thomas Walter; Laurent Bussard; Yves Roudier; Jochen Haller; Roger Kilian-Kehr; Joachim Posegga; Philip Robinson
- Book ID
- 108494632
- Publisher
- Elsevier Science
- Year
- 2004
- Tongue
- English
- Weight
- 562 KB
- Volume
- 9
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
📜 SIMILAR VOLUMES
This paper describes an approach to modeling the evolution of non-secure applications into secure applications in terms of the software requirements model and software architecture model. The requirements for security services are captured separately from application requirements, and the security s
## Abstract Recently, the world has become increasingly mobile, and people have started communicating by wireless networking. Mobile IPv6 enables mobile users to communicate with each other while moving. In this study, a mobile IPv6 network was implemented by the IEEE 802.11 specification, and its