Exploiting the network for securing personal devices

2Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Personal devices (such as smartphones and laptops) often experience incoherent levels of security due to the different protection applications available on the various devices. This paper presents a novel approach that consists in offloading security applications from personal devices and relocating them inside the network; this will be achieved by enriching network devices with the appropriate computational capabilities to execute generic security applications. This approach is fostered by the Secured project, which will define the architecture, data and protocols needed to turn this vision into reality.

Cite

CITATION STYLE

APA

Dalton, C., Lioy, A., Lopez, D., Risso, F., & Sassu, R. (2014). Exploiting the network for securing personal devices. Communications in Computer and Information Science, 470, 16–27. https://doi.org/10.1007/978-3-319-12574-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free