Security Test Methodology for an Agent of a Mobile Device Management System

被引:0
|
作者
Rhee, Keunwoo [1 ]
Kim, Hawon [1 ]
Na, Hac Yun [1 ]
机构
[1] Attached Inst ETRI, 909 Jeomin Dong, Daejeon 305390, South Korea
关键词
Mobile Device Management agent; smart phone; tablet PC; security test;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose test items and methods for security functions of Mobile Device Management agent. Recently, many enterprises are adopting Mobile Device Management system to manage smart phones and tablet PCs used in business. However, there is no criteria to test whether such Mobile Device Management system correctly provide required security functions and whether such functions are secure. Especially, no criteria have been established as yet to test an agent which is installed on the mobile devices and directly controls the mobile devices. Therefore, we propose the first test methodology to test the Mobile Device Management agent by identifying security requirements and drawing test items and methods. The proposed items and methods are practical since we illustrate the test items, their processes, and real world test methods for Android devices.
引用
收藏
页码:137 / 142
页数:6
相关论文
共 50 条
  • [21] Methodology of risk assessment in mobile agent system design
    McLean, I
    Szymanski, B
    Bivens, A
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 35 - 42
  • [22] Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-hao
    IETE TECHNICAL REVIEW, 2015, 32 (03) : 183 - 187
  • [23] A method to evaluate security performance of mobile agent system
    Wang, Suzhen
    Wang, Jiazhen
    Peng, Deyun
    2006 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI 2006), PROCEEDINGS, 2006, : 833 - +
  • [24] Security concepts and implementation in the Ara mobile agent system
    Peine, H
    SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98), 1998, : 236 - 242
  • [25] Communication Security Research Based on Mobile Agent System
    Guan, Huanmei
    Zhang, Jingwei
    Liu, Jun
    Wang, Juan
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III: UNLOCKING THE FULL POTENTIAL OF GLOBAL TECHNOLOGY, 2008, : 204 - 207
  • [26] Mobile Agent Security Based on Artificial Immune System
    Brahmi, Zaki
    Lini, Amine
    Gammoudi, Mohamed Mohsen
    INTERNATIONAL JOINT CONFERENCE SOCO'14-CISIS'14-ICEUTE'14, 2014, 299 : 385 - 395
  • [27] Mobile agent security
    Borselius, N
    ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 2002, 14 (05): : 211 - 218
  • [28] Information System Audit for Mobile Device Security Assessment
    Abu Othman, Noor Ashitah
    Norman, Azah Anir
    Kiah, Miss Laiha Mat
    2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 50 - 55
  • [29] Trust measurement and management in mobile agent system
    Wang Suzhen
    Wang Jiazhen
    Dang Chen
    Zhang Yanan
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 1294 - 1297
  • [30] A Method for the Trust Management in Mobile Agent System
    Shen, Zhidong
    Jin, Jin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 169 - 173