TY - JOUR AU - Zair Abdelouahab AU - Claudio Aroucha AU - Denivaldo Lopes AU - Jonathan Santos AU - Willian Ribeiro AU - Higo Pires PY - 2015/02/28 Y2 - 2024/03/29 TI - Adaptive Security Mechanism: a study on the different approaches to mobile devices JF - Journal of Information Sciences and Computing Technologies JA - JISCT VL - 2 IS - 2 SE - Articles DO - UR - http://scitecresearch.com/journals/index.php/jisct/article/view/70 AB - This article provides an overview of some major works that focus on the use of adaptive security for mobile computing to protect information and data traffic. The limited resources on the mobile device makes security mechanisms implementations very expensive. However, these devises are very attractive to attackers to exploit their weaknesses, launch scanning attacks, and man-in-the-middle attacks to have access to private data of mobile users. To provide security for users of mobile devices, security mechanism with the ability to adapt to various states and situations may be applied such as encryption to increase confidentiality, authentication so that only authorized users or systems have access to its data, and prioritizes ergonomics of the mobile device. For this purpose, mobile features such as CPU, memory, battery, and the environment in which it is connected must be operated by the adaptive security mechanism. ER -