Hierarchical data security measures for a mobile device

作者: Oliver S. C. Quigley , Nathan McCAULEY , Bob Lee , Eric Monti , Michael R. Lewis

DOI:

关键词: Hierarchical database modelMobile deviceComputer scienceEmbedded system

摘要:

参考文章(65)
Felix Madlener, Ismet Koyun, Ralf Laue, Secure Access to Data in a Device ,(2012)
John H. Lowry, Jonathan A. Rubin, System and method for remote integrity verification ,(2011)
Anthony Kobrinetz, Eric Ridvan Uner, Joshua Scott Matthews, Benjamin James Leslie, Martin H. Singer, Systems and methods for enhanced security in wireless communication ,(2011)
Aaron Schwartzbard, Michael Schatz, Christoph C. Michael, Anup K. Ghosh, Computer intrusion detection system and method based on application monitoring ,(2000)
Oliver Whitehouse, Michael Kenneth Brown, Christopher Lyle Bender, Michael Grant Kirkup, System and method for controlling applications to mitigate the effects of malicious software ,(2010)
Ravosh Samari, Paymaan Behrouzi, Shane Campbell, Efficient matching of data ,(2012)
Ian Foo, Jeremy E. Stieglitz, Jeevan Patil, Shripati Acharya, Techniques for providing security protection in wireless networks by switching modes ,(2007)