Personal devices (such as smartphones and laptops) often experience incoherent levels of security due to the different protection applications available on the various devices. This paper presents a novel approach that consists in offloading security applications from personal devices and relocating them inside the network; this will be achieved by enriching network devices with the appropriate computational capabilities to execute generic security applications. This approach is fostered by the Secured project, which will define the architecture, data and protocols needed to turn this vision into reality.
Exploiting the network for securing personal devices / Dalton, C.; Lioy, Antonio; Lopez, D.; Risso, FULVIO GIOVANNI OTTAVIO; Sassu, Roberto. - STAMPA. - (2014), pp. 16-27. (Intervento presentato al convegno Third Cyber Security and Privacy EU Forum tenutosi a Athens (Greece) nel 21-22 May 2014) [10.1007/978-3-319-12574-9_2].
Exploiting the network for securing personal devices
LIOY, ANTONIO;RISSO, FULVIO GIOVANNI OTTAVIO;SASSU, ROBERTO
2014
Abstract
Personal devices (such as smartphones and laptops) often experience incoherent levels of security due to the different protection applications available on the various devices. This paper presents a novel approach that consists in offloading security applications from personal devices and relocating them inside the network; this will be achieved by enriching network devices with the appropriate computational capabilities to execute generic security applications. This approach is fostered by the Secured project, which will define the architecture, data and protocols needed to turn this vision into reality.File | Dimensione | Formato | |
---|---|---|---|
secured_cspf_2014.pdf
Open Access dal 19/11/2015
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
PUBBLICO - Tutti i diritti riservati
Dimensione
495.38 kB
Formato
Adobe PDF
|
495.38 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2577744
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo