Boris Dragovic, Calicrates Policroniades,
The ubiquitous computing vision brings about a number of information security and privacy challenges, some of which we already face in the mobile computing arena. This work focuses on a context-specific class of information leakage threats not involving a malicious custodian. Information exposure threats arise as a side effect of a particular choice of data management procedures employed during legitimate information use or possession in a specific context. They affect, in different forms, information ...
Tópico(s): Security and Verification in Computing
2005 - Springer Science+Business Media | Lecture notes in computer science