2013
DOI: 10.3745/ktccs.2013.2.12.541
|View full text |Cite
|
Sign up to set email alerts
|

An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone

Abstract: Recently software security of the smart phone is an important issue in the field of information science and technology due to fast propagation of smart technology in our life. The smart phone as the security critical systems which are utilizing in terminal systems of the banking, ubiquitous home management, airline passengers screening, and so on are related to the risk of costs, risk of loss, risk of availability, and risk by usage. For the security issues, software hazard analysis of smart phone is the key a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…User Authentication is a procedure that makes sure whether user who is permitted access is or not, this procedure is progressing with 3 steps as below. The way of ID/Password is commercialized normally, but nowadays the ways of accredited certificate, security card, OTP and biometrics are mostly used [3,11,[16][17][18]. Table 4 depicts the information security control and governance according to security vulnerability and hazard factors under fault mechanism in user authentication phase.…”
Section: User Authenticationmentioning
confidence: 99%
See 3 more Smart Citations
“…User Authentication is a procedure that makes sure whether user who is permitted access is or not, this procedure is progressing with 3 steps as below. The way of ID/Password is commercialized normally, but nowadays the ways of accredited certificate, security card, OTP and biometrics are mostly used [3,11,[16][17][18]. Table 4 depicts the information security control and governance according to security vulnerability and hazard factors under fault mechanism in user authentication phase.…”
Section: User Authenticationmentioning
confidence: 99%
“…Next, access control in middleware operates in database. Lastly, access control in hardware operates physical access control [3,11,19].…”
Section: Access Controlmentioning
confidence: 99%
See 2 more Smart Citations
“…Smartphones that we know as a powerful tool for computing today could be used for ubiquitous learning system at anyplace anywhere, The security of the Smartphone is the important issues in the field of informatics technology due to fast propagation of smart technology of our life [2]. The performance of smartphone applications is usually constrained in user interactions due to resource limitation, and it promises great opportunities to improve the performance by exploring the smartphone built-in and embedded sensing techniques.…”
Section: Introductionmentioning
confidence: 99%