A framework for resource security in mobile computing

被引:0
|
作者
Yu, WJ [1 ]
Mok, AK [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Austin, TX 78712 USA
来源
PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS | 2002年
关键词
resource security; certified code; mobile computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a framework for efficiently and effectively safeguard resource utilization bound in mobile computing. Our goal is achieved by coupling self-certified code approach and and run-time monitoring. The resource usage of a program is abstracted into a resource skeleton, and validated using a resource usage certificate derived from proof generation. Our framework provides full coverage for resource security by statically checking resource usage certificates and by dynamically monitoring any essential property not guaranteed by the certificates.
引用
收藏
页码:312 / 317
页数:6
相关论文
共 50 条
  • [21] A Thread-Oriented Memory Resource Management Framework for Mobile Edge Computing
    Zhu, Zongwei
    Wu, Fan
    Cao, Jing
    Li, Xi
    Jia, Gangyong
    IEEE ACCESS, 2019, 7 : 45881 - 45890
  • [22] Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing
    Zhongjin Li
    Haiyang Hu
    Binbin Huang
    Jie Chen
    Chuanyi Li
    Hua Hu
    Liguo Huang
    Multimedia Tools and Applications, 2020, 79 : 10751 - 10780
  • [23] Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing
    Li, Zhongjin
    Hu, Haiyang
    Huang, Binbin
    Chen, Jie
    Li, Chuanyi
    Hu, Hua
    Huang, Liguo
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10751 - 10780
  • [24] Robust Security With Strong Authentication in Mobile Cloud Computing Based on Trefoil Congruity Framework
    Kumar, Jerald Nirmal S.
    Ravimaran, S.
    Sathish, A.
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2021, 33 (06)
  • [25] InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices
    Gupta, Anand
    Gupta, Deepank
    Gupta, Nidhi
    CONTEMPORARY COMPUTING, PROCEEDINGS, 2009, 40 : 637 - 648
  • [26] Adaptive Computing Resource Allocation for Mobile Cloud Computing
    Liang, Hongbin
    Xing, Tianyi
    Cai, Lin X.
    Huang, Dijiang
    Peng, Daiyuan
    Liu, Yan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [27] Mobile cloud computing: Architecture and Security
    Wang, Suzhen
    Du, Zhijuan
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2274 - 2281
  • [28] Security and Privacy in Mobile Cloud Computing
    Suo, Hui
    Liu, Zhuohua
    Wan, Jiafu
    Zhou, Keliang
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 655 - 659
  • [29] Mobile Cloud Computing: Security Threats
    Vikas, Solanke S.
    Gurudatt, Kulkarni A.
    Pawan, Katgaonkar
    Shyam, Gupta
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [30] Mobile Cloud Computing: Security Analysis
    Gamlo, Amina H.
    Zhang, Ning
    Bamasag, Omaimah
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD), 2017, : 191 - 198