Home > Research > Publications & Outputs > Classification and Mapping of Adaptive Security...

Links

Text available via DOI:

View graph of relations

Classification and Mapping of Adaptive Security for Mobile Computing

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Classification and Mapping of Adaptive Security for Mobile Computing. / Sajjad, Maryam; Ahmad, Aakash; Malik, Asad Waqar et al.
In: IEEE Transactions on Emerging Topics in Computing, Vol. 8, No. 3, 8252799, 01.07.2020, p. 814-832.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Sajjad, M, Ahmad, A, Malik, AW, Altamimi, AB & Alseadoon, I 2020, 'Classification and Mapping of Adaptive Security for Mobile Computing', IEEE Transactions on Emerging Topics in Computing, vol. 8, no. 3, 8252799, pp. 814-832. https://doi.org/10.1109/TETC.2018.2791459

APA

Sajjad, M., Ahmad, A., Malik, A. W., Altamimi, A. B., & Alseadoon, I. (2020). Classification and Mapping of Adaptive Security for Mobile Computing. IEEE Transactions on Emerging Topics in Computing, 8(3), 814-832. Article 8252799. https://doi.org/10.1109/TETC.2018.2791459

Vancouver

Sajjad M, Ahmad A, Malik AW, Altamimi AB, Alseadoon I. Classification and Mapping of Adaptive Security for Mobile Computing. IEEE Transactions on Emerging Topics in Computing. 2020 Jul 1;8(3):814-832. 8252799. Epub 2018 Jan 9. doi: 10.1109/TETC.2018.2791459

Author

Sajjad, Maryam ; Ahmad, Aakash ; Malik, Asad Waqar et al. / Classification and Mapping of Adaptive Security for Mobile Computing. In: IEEE Transactions on Emerging Topics in Computing. 2020 ; Vol. 8, No. 3. pp. 814-832.

Bibtex

@article{db67f35f78c14ea5a769d7f3667d8983,
title = "Classification and Mapping of Adaptive Security for Mobile Computing",
abstract = "Context: Mobile computing has emerged as a disruptive technology that has empowered its users with portable, connected and context-aware computation. However, issues such as resource poverty, energy efficiency and specifically data security and privacy represents the critical challenges for mobile computing. Objective: The objective of this work is to systematically identify, taxonomically classify and map the state-of-research on adaptive security (a.k.a. self-protection) for mobile computing. Methodology: We followed evidence based software engineering method to conduct a systematic mapping study of 43 qualitatively selected studies - published from 2003 to 2017 - on adaptive security for mobile computing. Results and Conclusions: Classification and mapping of the research highlights three prominent themes that support adaptive security for (i) Mobile Device Data and Resources, (ii) Mobile to Mobile Communication, and (iii) Mobile to Server Communication. Mapping analysis suggests that security of mobile device data and resources is the most researched theme. The mapping study highlights that active and futuristic research trends are primarily focused on security as a service, whereas; the frequent research challenges relate to self-protecting mobile devices, user-driven privacy decisions and context-aware security. The results of the mapping study facilitate knowledge transfer that can benefit researchers and practitioners to understand the role of adaptive and context-aware security in mobile computing environments.",
keywords = "Autonomic computing, evidence based software engineering, mapping study, mobile computing, security",
author = "Maryam Sajjad and Aakash Ahmad and Malik, {Asad Waqar} and Altamimi, {Ahmed B.} and Ibrahim Alseadoon",
note = "Publisher Copyright: {\textcopyright} 2013 IEEE.",
year = "2020",
month = jul,
day = "1",
doi = "10.1109/TETC.2018.2791459",
language = "English",
volume = "8",
pages = "814--832",
journal = "IEEE Transactions on Emerging Topics in Computing",
issn = "2168-6750",
publisher = "IEEE Computer Society",
number = "3",

}

RIS

TY - JOUR

T1 - Classification and Mapping of Adaptive Security for Mobile Computing

AU - Sajjad, Maryam

AU - Ahmad, Aakash

AU - Malik, Asad Waqar

AU - Altamimi, Ahmed B.

AU - Alseadoon, Ibrahim

N1 - Publisher Copyright: © 2013 IEEE.

PY - 2020/7/1

Y1 - 2020/7/1

N2 - Context: Mobile computing has emerged as a disruptive technology that has empowered its users with portable, connected and context-aware computation. However, issues such as resource poverty, energy efficiency and specifically data security and privacy represents the critical challenges for mobile computing. Objective: The objective of this work is to systematically identify, taxonomically classify and map the state-of-research on adaptive security (a.k.a. self-protection) for mobile computing. Methodology: We followed evidence based software engineering method to conduct a systematic mapping study of 43 qualitatively selected studies - published from 2003 to 2017 - on adaptive security for mobile computing. Results and Conclusions: Classification and mapping of the research highlights three prominent themes that support adaptive security for (i) Mobile Device Data and Resources, (ii) Mobile to Mobile Communication, and (iii) Mobile to Server Communication. Mapping analysis suggests that security of mobile device data and resources is the most researched theme. The mapping study highlights that active and futuristic research trends are primarily focused on security as a service, whereas; the frequent research challenges relate to self-protecting mobile devices, user-driven privacy decisions and context-aware security. The results of the mapping study facilitate knowledge transfer that can benefit researchers and practitioners to understand the role of adaptive and context-aware security in mobile computing environments.

AB - Context: Mobile computing has emerged as a disruptive technology that has empowered its users with portable, connected and context-aware computation. However, issues such as resource poverty, energy efficiency and specifically data security and privacy represents the critical challenges for mobile computing. Objective: The objective of this work is to systematically identify, taxonomically classify and map the state-of-research on adaptive security (a.k.a. self-protection) for mobile computing. Methodology: We followed evidence based software engineering method to conduct a systematic mapping study of 43 qualitatively selected studies - published from 2003 to 2017 - on adaptive security for mobile computing. Results and Conclusions: Classification and mapping of the research highlights three prominent themes that support adaptive security for (i) Mobile Device Data and Resources, (ii) Mobile to Mobile Communication, and (iii) Mobile to Server Communication. Mapping analysis suggests that security of mobile device data and resources is the most researched theme. The mapping study highlights that active and futuristic research trends are primarily focused on security as a service, whereas; the frequent research challenges relate to self-protecting mobile devices, user-driven privacy decisions and context-aware security. The results of the mapping study facilitate knowledge transfer that can benefit researchers and practitioners to understand the role of adaptive and context-aware security in mobile computing environments.

KW - Autonomic computing

KW - evidence based software engineering

KW - mapping study

KW - mobile computing

KW - security

U2 - 10.1109/TETC.2018.2791459

DO - 10.1109/TETC.2018.2791459

M3 - Journal article

AN - SCOPUS:85041205891

VL - 8

SP - 814

EP - 832

JO - IEEE Transactions on Emerging Topics in Computing

JF - IEEE Transactions on Emerging Topics in Computing

SN - 2168-6750

IS - 3

M1 - 8252799

ER -