Abstract
Security has been more crucial issue as targets of attacker are wide ranges from personal information to various things in ubiquitous computing environments. Portable computing devices such as cellular phone, PDA, and smart phone in such conditions have been exposured under security threats, which cause attacker to exploit malicious code and modification of storied data. In this paper we present security threats and their countermeasures in technical, manageable, and physical aspect of mobile portable computing devices. We believe that this paper will contributes on initiating a research on security issues of mobile portable computing devices and provide users with guidance to keep their information safe in mobile communication environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barnes, D.: Portable Computing Device Security (September 2003)
Symentec: Wireless Handheld and Smart phone Security (2003)
Palm: Handheld Security for the Mobile Enterprise (September 2002)
Karygiannis, T., et al.: NIST. Wireless Network Security (September 2002)
Ramjee, R., et al.: IP-based Access Network Infrastructure for Next-Generation Wireless Data Networks. IEEE Personal Communications (August 2000)
Stajano, F., et al.: The Resurrecting Duckling: Security Issues for Ubiquitous Computing. IEEE security and Privacy (2002)
Seigneur, J.M., Farrell, S., et al.: Secure ubiquitous computing based on entity recognition. In: Workshop on Security in ubiquitous computing, 4th International UBICOMP (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, S.h., Leem, C.S. (2005). Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3483. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424925_10
Download citation
DOI: https://doi.org/10.1007/11424925_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25863-6
Online ISBN: 978-3-540-32309-9
eBook Packages: Computer ScienceComputer Science (R0)