TEST - Catálogo BURRF
   

Trustworthy Execution on Mobile Devices / by Amit Vasudevan, Jonathan M. McCune, James Newsome.

Por: Colaborador(es): Tipo de material: TextoTextoSeries SpringerBriefs in Computer ScienceEditor: New York, NY : Springer New York : Imprint: Springer, 2014Descripción: xiii, 85 páginas 15 ilustraciones recurso en líneaTipo de contenido:
  • texto
Tipo de medio:
  • computadora
Tipo de portador:
  • recurso en línea
ISBN:
  • 9781461481904
Formatos físicos adicionales: Edición impresa:: Sin títuloClasificación LoC:
  • QA76.9.A25
Recursos en línea:
Contenidos:
Introduction -- Demand for Applications Requiring Hardware Security -- Desired Security Features -- Available Hardware Primitives -- Isolated Execution Environments -- API Architectures -- Analysis and Recommendations -- Summary.
Resumen: This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Springer eBooks

Introduction -- Demand for Applications Requiring Hardware Security -- Desired Security Features -- Available Hardware Primitives -- Isolated Execution Environments -- API Architectures -- Analysis and Recommendations -- Summary.

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Para consulta fuera de la UANL se requiere clave de acceso remoto.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha