Personal devices (such as smartphones and laptops) often experience incoherent levels of security due to the different protection applications available on the various devices. This paper presents a novel approach that consists in offloading security applications from personal devices and relocating them inside the network; this will be achieved by enriching network devices with the appropriate computational capabilities to execute generic security applications. This approach is fostered by the Secured project, which will define the architecture, data and protocols needed to turn this vision into reality.

Exploiting the network for securing personal devices / Dalton, C.; Lioy, Antonio; Lopez, D.; Risso, FULVIO GIOVANNI OTTAVIO; Sassu, Roberto. - STAMPA. - (2014), pp. 16-27. (Intervento presentato al convegno Third Cyber Security and Privacy EU Forum tenutosi a Athens (Greece) nel 21-22 May 2014) [10.1007/978-3-319-12574-9_2].

Exploiting the network for securing personal devices

LIOY, ANTONIO;RISSO, FULVIO GIOVANNI OTTAVIO;SASSU, ROBERTO
2014

Abstract

Personal devices (such as smartphones and laptops) often experience incoherent levels of security due to the different protection applications available on the various devices. This paper presents a novel approach that consists in offloading security applications from personal devices and relocating them inside the network; this will be achieved by enriching network devices with the appropriate computational capabilities to execute generic security applications. This approach is fostered by the Secured project, which will define the architecture, data and protocols needed to turn this vision into reality.
File in questo prodotto:
File Dimensione Formato  
secured_cspf_2014.pdf

Open Access dal 19/11/2015

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: PUBBLICO - Tutti i diritti riservati
Dimensione 495.38 kB
Formato Adobe PDF
495.38 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2577744
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo