Secure Mobile Business Information Processing

作者: Nicolai Kuntze , Roland Rieke , Gunther Diederich , Richard Sethmann , Karsten Sohr

DOI: 10.1109/EUC.2010.107

关键词:

摘要: An ever increasing amount of functionality is incorporated into mobile phones—this trend will continue as new phone platforms are more widely used such the iPhone or Android. Along with this trend, however, risks arise, especially for enterprises using phones security-critical applications business intelligence (BI). Although like Android have implemented sophisticated security mechanisms, holes been reported. In addition, different stakeholders access to enterprises, service providers, operators, manufacturers. order protect applications, a trustworthy platform needed. Starting typical attack scenarios, we describe architecture based on concepts Trusted Computing. particular, allows dynamic policy change reflect current environment being in.

参考文章(7)
Peter Cumming, The TI OMAP™ Platform Approach to SOC Winning the SoC Revolution. pp. 97- 118 ,(2003) , 10.1007/978-1-4615-0369-9_5
Kurt Dietrich, Martin Pirker, Tobias Vejda, Ronald Toegl, Thomas Winkler, Peter Lipp, A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing Trustworthy Global Computing. pp. 156- 168 ,(2007) , 10.1007/978-3-540-78663-4_12
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer, Google Android: A Comprehensive Security Assessment ieee symposium on security and privacy. ,vol. 8, pp. 35- 44 ,(2010) , 10.1109/MSP.2010.2
William Enck, Machigar Ongtang, Patrick McDaniel, Understanding Android Security ieee symposium on security and privacy. ,vol. 7, pp. 50- 57 ,(2009) , 10.1109/MSP.2009.26
Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper, On the Deployment of Mobile Trusted Modules wireless communications and networking conference. pp. 3169- 3174 ,(2008) , 10.1109/WCNC.2008.553
Johannes Winter, Trusted computing building blocks for embedded linux-based ARM trustzone platforms Proceedings of the 3rd ACM workshop on Scalable trusted computing - STC '08. pp. 21- 30 ,(2008) , 10.1145/1456455.1456460
S. Ravi, A. Raghunathan, S. Chakradhar, Tamper resistance mechanisms for secure embedded systems international conference on vlsi design. pp. 605- 611 ,(2004) , 10.1109/ICVD.2004.1260985