Wireless Mobile Security

This paper offers an overview of the current threats to mobile system data confidentiality, availability and integrity. It will present the data-centric security model as a key enabler for secure personal and business use of mobile devices. Finally, the incident handling model will be applied...
Erik Couture
December 3, 2010

All papers are copyrighted. No re-posting of papers is permitted