A device management framework for secure ubiquitous service delivery

A Leung, CJ Mitchell - … on Information Assurance and Security, 2008 - ieeexplore.ieee.org
… In a mobile ubiquitous environment, service interactions between a user device and a … we
present our secure device management framework, and Section 5 analyses its security. Finally…

Blockchain-based secure device management framework for an internet of things network in a smart city

S Gong, E Tcydenova, J Jo, Y Lee, JH Park - Sustainability, 2019 - mdpi.com
… This paper proposes a blockchain-based device management framework for secure device
… , the security requirements for secure device management in a smart city environment is …

A mobile device management framework for secure service delivery

A Leung - Information Security Technical Report, 2008 - Elsevier
… In a mobile ubiquitous environment, service interactions between a user device and a … we
present our secure device management framework, and Section 5 analyses its security. Finally…

Secure mobile device management based on domain separation

GL Kim, YS Jeon, JN Kim - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
… The MSS system offers domain isolation that business data are protected from open platform
environment. We also describe secure mobile device management method with the MSS …

High-level design for a secure mobile device management system

K Rhee, SK Eun, MR Joo, J Jeong, D Won - … Security, Privacy, and Trust …, 2013 - Springer
… mobile device management system with using the Common Criteria for Information Technology
Security … The Operational Environment of an MDM System. The proposed MDM system is …

On secure data management in health-care environment

A Castiglione, C D'Ambrosio… - … on innovative mobile …, 2013 - ieeexplore.ieee.org
… systems which allows the rapid and secure sharing of clinical experiences among different
secure sharing of all information (both medical and not) necessary for patients management. …

[PDF][PDF] Security requirements of a mobile device management system

K Rhee, W Jeon, D Won - International Journal of Security and Its …, 2012 - researchgate.net
… Record Threat agent can exhaust the storage capacity of both the MDM system and the
operating environment of the MDM system so that security-related events and data essential to …

Security risk management in IoT environment

V Malik, S Singh - Journal of Discrete Mathematical Sciences and …, 2019 - Taylor & Francis
… , features, device limitations, and risks in IoT privacy and security, … Section 3 deals with
implementation results of securitysecure and available IoT networks, we face various security

IMSC-EIoTD: Identity management and secure communication for edge IoT devices

KM Sadique, R Rahmani, P Johannesson - Sensors, 2020 - mdpi.com
… need to be self-configurable, adaptable with the environment, and will have a unique …
management of IoT devices at the edge-fog layer and secure communication between IoT devices

Secure and intelligent energy data management scheme for smart IoT devices

T Zhou, J Shen, S Ji, Y Ren… - … and Mobile Computing, 2020 - Wiley Online Library
… more efficient and intelligent management of smart IoT devices. In this section, the deployment
of smart IoT devices in a renewable energy-based smart environment is presented, which …