File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ITAP.2011.6006420
- Scopus: eid_2-s2.0-80052852619
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Secure end-to-end browsing system with mobile composition
Title | Secure end-to-end browsing system with mobile composition |
---|---|
Authors | |
Keywords | Data leakage Secure Browsing Mobile phone Java applet |
Issue Date | 2011 |
Publisher | IEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1800200 |
Citation | The 2011 International Conference on Internet Technology and Applications (iTAP 2011), Wuhan, China, 16-18 August 2011. In Conference Proceedings, 2011, p. 1-4 How to Cite? |
Abstract | To fix the more and more serious leakage problem in remote access to confidential data, the paper designs and implements a secure end-to-end browsing system with mobile composition. It enables mobile-authenticated users to browse confidential files stored at server side using their personal computers securely. The authentication function is in real-time such that the system can stop the browsing function once it detects that the authenticated mobile is out of the communication range of user's personal computer. © 2011 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/152010 |
ISBN | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jiang, ZL | en_US |
dc.contributor.author | Fang, J | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.date.accessioned | 2012-06-26T06:32:24Z | - |
dc.date.available | 2012-06-26T06:32:24Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | The 2011 International Conference on Internet Technology and Applications (iTAP 2011), Wuhan, China, 16-18 August 2011. In Conference Proceedings, 2011, p. 1-4 | en_US |
dc.identifier.isbn | 978-1-4244-7255-0 | - |
dc.identifier.uri | http://hdl.handle.net/10722/152010 | - |
dc.description.abstract | To fix the more and more serious leakage problem in remote access to confidential data, the paper designs and implements a secure end-to-end browsing system with mobile composition. It enables mobile-authenticated users to browse confidential files stored at server side using their personal computers securely. The authentication function is in real-time such that the system can stop the browsing function once it detects that the authenticated mobile is out of the communication range of user's personal computer. © 2011 IEEE. | en_US |
dc.language | eng | en_US |
dc.publisher | IEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1800200 | - |
dc.relation.ispartof | International Conference on Internet Technology and Applications (iTAP) | en_US |
dc.subject | Data leakage | en_US |
dc.subject | Secure Browsing | en_US |
dc.subject | Mobile phone | en_US |
dc.subject | Java applet | - |
dc.title | Secure end-to-end browsing system with mobile composition | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_US |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_US |
dc.identifier.authority | Hui, LCK=rp00120 | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1109/ITAP.2011.6006420 | en_US |
dc.identifier.scopus | eid_2-s2.0-80052852619 | en_US |
dc.identifier.hkuros | 211526 | - |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-80052852619&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 4 | - |
dc.publisher.place | United States | - |
dc.identifier.scopusauthorid | Jiang, ZL=24344329800 | en_US |
dc.identifier.scopusauthorid | Fang, J=36132767400 | en_US |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_US |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_US |
dc.customcontrol.immutable | sml 150422 | - |