دانلود رایگان مقالات اسپرینگر - springerدانلود رایگان مقالات ژورنالی فناوری اطلاعات و ارتباطات ICTدانلود رایگان مقالات سال 2017دانلود رایگان مقاله ISI دیتا به زبان انگلیسیدانلود رایگان مقاله ISI فناوری اطلاعات و ارتباطات ICT به زبان انگلیسی سال 2022 و 2023دانلود رایگان مقاله ISI گردش کار به زبان انگلیسیدانلود رایگان مقاله ISI مخابرات سیار به زبان انگلیسیدانلود رایگان مقاله ISI مدیریت به زبان انگلیسی سال 2022 و 2023دانلود رایگان مقاله ISI موبایل یا تلفن همراه به زبان انگلیسیسال انتشار

مقاله انگلیسی رایگان در مورد بهبود اجرای روند کاری موبایل توسط تزریق کنترل های امنیتی – اسپرینگر ۲۰۱۷

 

مشخصات مقاله
ترجمه عنوان مقاله چارچوبی برای بهبود اجرای روند کاری موبایل از طریق تزریق کنترل های امنیتی انعطاف پذیر
عنوان انگلیسی مقاله A framework for enhancing mobile workflow execution through injection of flexible security controls
انتشار مقاله سال ۲۰۱۷
تعداد صفحات مقاله انگلیسی ۱۴ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه اسپرینگر
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی فناوری اطلاعات و ارتباطات
گرایش های مرتبط دیتا و امنیت شبکه، مخابرات سیار
مجله مدارهای مجتمع آنالوگ و پردازش سیگنال – Analog Integrated Circuits and Signal Processing
دانشگاه Technical University of Madrid – Madrid – Spain
کلمات کلیدی اجرای گردش کار موبایل، مدل سازی امنیتی، کنترل امنیت، تزریق امنیت
کلمات کلیدی انگلیسی Mobile workflow execution, Security modeling, Security controls, Security injection
شناسه دیجیتال – doi
https://doi.org/10.1007/s10470-018-1167-8
کد محصول E9121
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
۱ Introduction

Mobile devices are a key part of daily life nowadays. People employ them for a wide range of activities such as surfing to the Internet, making calls (using Voice-over-IP – VoIP- technologies), and even monitoring in real time locations, biological signals and other people. Furthermore, as mobile device capabilities increases, industrial companies are also integrating mobile devices into their production systems, following the principles of the Industry 4.0 paradigm [1]. Most of the described scenarios require the definition of workflows (in an implicit or explicit way) whose execution, obviously, must support mobility. Implicit workflows are triggered by the mobile applications running into devices when a certain action is detected (for example, opening a web browser). On the other hand, explicit workflows are defined by people and the workflow execution system is explicitly requested to execute them in a certain moment. Moreover, most of these activities (workflows) require communicating with Internet-of-Things (IoT) devices, third-party cell phones, Cyber-Physical devices and production systems [2] and/or cloud-based servers which store and forward personal data and provide tailored services. Therefore, mobile devices turn into critical components when workflows are executed. In this context, mobile workflows require techniques to avoid fails during executions (e.g. dead-locks), to detect risky situations derived from the mobile nature of devices (coverage problems, battery failures, etc.), to implement an adequate management policy of personal information, and/or to guarantee a safe communication among components and devices (among other needs). In fact, core security requirements, such as the previously cited confidentiality, integrity or availability, are becoming a foremost concern in today’s life [3]. However, despite the amount of the components that could came across the execution of mobile workflows [4], these requirements are nowadays still addressed with computer science solutions (as controls in the network perimeter layer, e.g. with firewalls and VPNs; in the OS layer e.g. sandboxing, or at the application layer e.g. with antivirus), or with traditional industrial techniques [5]. Thus, there is a major challenge related to how to adapt these controls to the high dynamism and decoupled execution of mobile workflows and their computing environment. Besides, new security solutions specifically designed to address the new risk of the world wide connected society should be also proposed (for example, tourists who are monitored by their medical center in their country of origin thousands of miles away). One of the most effective manners of securing workflows and, in general, execution systems is the injection of security controls along the execution model (workflow) [6]. Security controls are evaluation points where some relevant previously defined indicators are measured. This set of indicators must be proposed in such way that they represent the security state of the workflow execution. Relevant indicators strongly depend on the application scenario; any case, security controls are countermeasures that mitigate the probability of a threat affecting a workflow execution independently of their fixed or mobile nature. Moreover, as a mobile workflow could make use of a variety of local, remote or cloud-based systems to carry out its purposes, the security controls shall be adjusted to the entire workflow lifecycle [7], from its creation to its end. This fact is especially critical during runtime, when a mobile workflow must deal with a set of constraints such as connectivity, power processing, network heterogeneity and user experience [4].

نوشته های مشابه

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا