-
1
-
-
50049105021
-
-
Canalys, "Worldwide smart phone market," http://www.canalys. com/pr/2005/r2005102.htm, 2005.
-
(2005)
Worldwide smart phone market
-
-
-
4
-
-
51949084698
-
-
Open Mobile Terminal Platform Alliance, OMTP Approved Deliverables, 2006. http://www.omtp.org/approved.html
-
Open Mobile Terminal Platform Alliance, "OMTP Approved Deliverables," 2006. http://www.omtp.org/approved.html
-
-
-
-
5
-
-
51949107349
-
-
Intel and NTT DoCoMo, Open and Secure Terminal Initiative (OSTI) Architecture Specification V1.0, 2006.
-
Intel and NTT DoCoMo, "Open and Secure Terminal Initiative (OSTI) Architecture Specification V1.0," 2006.
-
-
-
-
6
-
-
33750248123
-
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
-
R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn, "Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor," Annual Computer Security Application Conference, 2005.
-
(2005)
Annual Computer Security Application Conference
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
van Doorn, L.8
-
7
-
-
51949119355
-
sHype:A secure hypervisor approach to trusted virtualized systems
-
IBM Research Report
-
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. van Doorn, J. L. Griffin, and S. Berger. "sHype:A secure hypervisor approach to trusted virtualized systems," IBM Research Report, 2005.
-
(2005)
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
van Doorn, L.5
Griffin, J.L.6
Berger, S.7
-
9
-
-
21644433634
-
Xen and the art of virtualization
-
th ACM Symposium on Operating Systems Principles, 2003.
-
(2003)
th ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
10
-
-
85084160641
-
The Flask Security Architecture: System Support for Diverse Security Policies
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau, "The Flask Security Architecture: System Support for Diverse Security Policies," In Proceedings of the 8th USENIX Security Symposium, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
11
-
-
51949098506
-
Xen on ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones
-
USA, January
-
th Annual IEEE Consumer Communications & Networking Conference, USA, January 2008.
-
(2008)
th Annual IEEE Consumer Communications & Networking Conference
-
-
Hwang, J.1
Suh, S.2
Heo, S.3
Park, C.4
Ryu, J.5
Park, S.6
Kim, C.7
-
12
-
-
33644854066
-
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
-
D. C. Nash, T. L. Martin, D. S. Ha, and M. S. Hsiao, "Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices," In Proceedings of the Pervasive Computing and Communications Workshops, pp. 141-145, 2005.
-
(2005)
Proceedings of the Pervasive Computing and Communications Workshops
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
13
-
-
2642584004
-
Denial-of-Service Attacks on Battery-powered Mobile Computers
-
T. Martin, M. Hsiao, D. Ha, and J. Krishnaswami, "Denial-of-Service Attacks on Battery-powered Mobile Computers," Second IEEE International Conference on Pervasive Computing and Communications, pp. 309-318, 2004.
-
(2004)
Second IEEE International Conference on Pervasive Computing and Communications
, pp. 309-318
-
-
Martin, T.1
Hsiao, M.2
Ha, D.3
Krishnaswami, J.4
-
15
-
-
51949117497
-
-
Symantec Corporation
-
Symantec Corporation, "SymbOS.Cabir," http://securityresponse. symantec.com/avcenter/venc/data/epoc.cabir.html
-
SymbOS.Cabir
-
-
-
16
-
-
33646445517
-
NGSCB: A Trusted Open System, vol. 3108 of Lecture Notes in Computer
-
M. Peinado, Y. Chen, P. England, and J. Manferdelli, "NGSCB: A Trusted Open System," vol. 3108 of Lecture Notes in Computer Science, pp. 86-97, 2004.
-
(2004)
Science
, pp. 86-97
-
-
Peinado, M.1
Chen, Y.2
England, P.3
Manferdelli, J.4
-
18
-
-
0030672130
-
A Secure and Reliable Bootstrap Architecture
-
W. A. Arbaugh, D. J. Farber, J. M. Smith, "A Secure and Reliable Bootstrap Architecture," In Proceedings of IEEE Security and Privacy Conference, pp. 65-71, 1997.
-
(1997)
Proceedings of IEEE Security and Privacy Conference
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
19
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
S. T. King, P. M. Chen, Y. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch, "SubVirt: Implementing malware with virtual machines", In Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
20
-
-
33845953872
-
-
National Security Agency, SELinux
-
National Security Agency, "Security-Enhanced Linux (SELinux)," http://www.nsa.gov/selinux
-
Security-Enhanced Linux
-
-
-
21
-
-
0029211469
-
Practical Domain and Type Enforcement for UNIX
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat, "Practical Domain and Type Enforcement for UNIX," In Proceedings of the IEEE Symposium on Security and Privacy, 1995.
-
(1995)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
24
-
-
0004200684
-
-
Technical Report ESD-TR-73-51, I+II, Air Force Systems Command, USAF
-
James P. Anderson et. al., "Computer Security Technology Planning Study," Technical Report ESD-TR-73-51, Vol. I+II, Air Force Systems Command, USAF, 1972.
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.P.1
et., al.2
-
25
-
-
51949103444
-
-
Freescale, i.MX21 Applications Processor: Reference Manual, 2004.
-
Freescale, i.MX21 Applications Processor: Reference Manual," 2004.
-
-
-
-
26
-
-
51949095526
-
-
Department of Computer Science, University of Arizona, Tucson
-
M. Rajagopalan, S. Debray, M. A. Hiltunen, and R. D. Schlichting, "Reducing the Energy Cost of Application/OS Interactions," TR03-19, Department of Computer Science, University of Arizona, Tucson, 2003
-
(2003)
Reducing the Energy Cost of Application/OS Interactions
-
-
Rajagopalan, M.1
Debray, S.2
Hiltunen, M.A.3
Schlichting, R.D.4
|