(855) 4-ESSAYS

Type a new keyword(s) and press Enter to search

Paper Mobile Security Dominion


Security is a necessity in these environments and although many mechanisms are currently available for the security of networks, they are not sufficient enough to secure an application to the native device.
             2. Secure Dominions .
             Valuable services and resources must be available to first responders on-scene. These resources are most often applications, which must be secure enough to not only share sensitive data without compromise but also prevent any unauthorized access. Wireless networks currently do an acceptable job with providing security, but there also needs to be a secure form of access control between the user's mobile device and applications or data. A mobile security dominion is a method of access control between a collection of valuable assets and the mobile device. The dominion contains these assets and only allows access to the user when certain conditions exist. The conditional access must be granted specific to the user and device, such as being connected to particular cell tower or present in a pre-specified geographical area. Users who often operate with decentralized mobile networks fall under this category. These types of networks should also provide additional security and present solutions when the permanent infrastructure has been damaged or inaccessible. There are currently no mobile security dominions in use.
             3. Objectives .
             Our goal is to develop an infrastructure for mobile security dominions. The infrastructure will consist of an application to test appropriate conditions under which access should or should not be granted, a method to provide authentication between the secure application and mobile device, and the framework that allows access from device to sensitive assets (the dominion). The following components of the framework will be presented:.
             The testing application is the first instance of allowing secure access to the dominion. It tests whether or not the mobile device is currently connected to a particular mobile base station.


Essays Related to Paper Mobile Security Dominion


Got a writing question? Ask our professional writer!
Submit My Question