{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:42:06Z","timestamp":1740134526848,"version":"3.37.3"},"reference-count":9,"publisher":"Wiley","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Applied Mathematics"],"published-print":{"date-parts":[[2014]]},"abstract":"<jats:p>Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business\/work environments have become wire\/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs) are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (<jats:italic>m<\/jats:italic>-IPS) is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The<jats:italic>m<\/jats:italic>-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users\u2019 temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of<jats:italic>m<\/jats:italic>-IPS to the Internet of things (IoT), which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.<\/jats:p>","DOI":"10.1155\/2014\/198580","type":"journal-article","created":{"date-parts":[[2014,3,23]],"date-time":"2014-03-23T17:00:58Z","timestamp":1395594058000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient and Secure<i>m<\/i>-IPS Scheme of Mobile Devices for Human-Centric Computing"],"prefix":"10.1155","volume":"2014","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7421-1105","authenticated-orcid":true,"given":"Young-Sik","family":"Jeong","sequence":"first","affiliation":[{"name":"Department of Multimedia Engineering, Dongguk University, Seoul 100-715, Republic of Korea"}]},{"given":"Jae Dong","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 139-743, Republic of Korea"}]},{"given":"Jeong-Bae","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Sun Moon University, Asan 330-150, Republic of Korea"}]},{"given":"Jai-Jin","family":"Jung","sequence":"additional","affiliation":[{"name":"Department of Multimedia Engineering, Dankook University, Cheonan 330-714, Republic of Korea"}]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 139-743, Republic of Korea"}]}],"member":"311","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"issue":"1","key":"4","first-page":"5","volume":"3","year":"2012","journal-title":"Journal of ConvergenceNo"},{"issue":"1","key":"5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3745\/JIPS.2012.8.1.001","volume":"8","year":"2012","journal-title":"Journal of Information Processing Systems"},{"issue":"1","key":"7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","year":"1999","journal-title":"ACM Transactions on Information and System Security"},{"issue":"5","key":"6","first-page":"1","volume":"2","year":"2012","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"5","key":"8","first-page":"627","volume":"9","year":"2012","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9","first-page":"129","volume":"47","year":"2008","journal-title":"Revista Informatica Economica"},{"issue":"3","key":"12","first-page":"67","volume":"2","year":"2007","journal-title":"Ubiquitous Computing and Communication Journal"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2008.02.015"}],"container-title":["Journal of Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2014\/198580.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2014\/198580.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2014\/198580.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:12:37Z","timestamp":1498111957000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jam\/2014\/198580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":9,"alternative-id":["198580","198580"],"URL":"https:\/\/doi.org\/10.1155\/2014\/198580","relation":{},"ISSN":["1110-757X","1687-0042"],"issn-type":[{"type":"print","value":"1110-757X"},{"type":"electronic","value":"1687-0042"}],"subject":[],"published":{"date-parts":[[2014]]}}}