作者: Nicolai Kuntze , Roland Rieke , Gunther Diederich , Richard Sethmann , Karsten Sohr
DOI: 10.1109/EUC.2010.107
关键词:
摘要: An ever increasing amount of functionality is incorporated into mobile phones—this trend will continue as new phone platforms are more widely used such the iPhone or Android. Along with this trend, however, risks arise, especially for enterprises using phones security-critical applications business intelligence (BI). Although like Android have implemented sophisticated security mechanisms, holes been reported. In addition, different stakeholders access to enterprises, service providers, operators, manufacturers. order protect applications, a trustworthy platform needed. Starting typical attack scenarios, we describe architecture based on concepts Trusted Computing. particular, allows dynamic policy change reflect current environment being in.