메뉴 건너뛰기




Volumn , Issue , 2010, Pages 221-230

Porscha: Policy oriented secure content handling in android

Author keywords

Android; DRM; mobile phone security; security policy

Indexed keywords

ANDROID (OPERATING SYSTEM); COPYRIGHTS; MOBILE SECURITY; SMARTPHONES;

EID: 78751555807     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1920261.1920295     Document Type: Conference Paper
Times cited : (66)

References (52)
  • 1
    • 85170013322 scopus 로고    scopus 로고
    • March
    • Android Community ROM. http://www.cyanogenmod.com/, March 2010.
    • (2010) Android Community ROM
  • 3
    • 85170008059 scopus 로고    scopus 로고
    • January
    • Mobile Watchdog. http://www.mymobilewatchdog.com/, January 2010.
    • (2010)
  • 4
    • 85170024394 scopus 로고    scopus 로고
    • January
    • SMS Trap. http://www.smstrap.com/, January 2010.
    • (2010)
  • 5
    • 85170010547 scopus 로고    scopus 로고
    • January
    • Stealth SMS. http://stealthsms.trusters.com/s-features.htm, January 2010.
    • (2010)
  • 6
    • 77956986526 scopus 로고    scopus 로고
    • A5/1 Security Project
    • A5/1 Security Project. Creating A5/1 Rainbow Tables. http://reflextor. com/trac/a51, 2009.
    • (2009) Creating A5/1 Rainbow Tables
  • 7
    • 85170015092 scopus 로고    scopus 로고
    • March
    • Apache Software Foundation. Apache James Mime4j. http://james.apache.org/ mime4j/, March 2010.
    • (2010) Apache James Mime4j
  • 13
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • D. E. Denning. A Lattice Model of Secure Information Flow. Commun. ACM, 19(5):236-243, May 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 17
    • 85170010909 scopus 로고    scopus 로고
    • Free Software Foundation, Inc. June
    • Free Software Foundation, Inc. The Campaign to Eliminate DRM. http://www.defectivebydesign.org/, June 2010.
    • (2010) The Campaign to Eliminate DRM
  • 19
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-Based Encryption and the Certificate-Revocation Problem
    • January
    • C. Gentry. Certificate-Based Encryption and the Certificate-Revocation Problem. Advances in Cryptology, 2656, January 2003.
    • (2003) Advances in Cryptology , vol.2656
    • Gentry, C.1
  • 21
    • 78751531717 scopus 로고    scopus 로고
    • Jan.
    • GigaOm. The Apple App Store Economy. http://gigaom.com/2010/01/12/the- apple-app-store-economy, Jan. 2010.
    • (2010) The Apple App Store Economy
  • 22
    • 84947242701 scopus 로고    scopus 로고
    • Toward Hierarchical Identity-Based Encryption
    • London, UK, Springer-Verlag
    • J. Horwitz and B. Lynn. Toward Hierarchical Identity-Based Encryption. In Proceedings of EUROCRYPT '02, pages 466-481, London, UK, 2002. Springer-Verlag.
    • (2002) Proceedings of EUROCRYPT '02 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 23
    • 33748598990 scopus 로고    scopus 로고
    • An Efficient Identity-Based Cryptosystem for End-to-End Mobile Security
    • September
    • J.-S. Hwu, R.-J. Chen, and Y.-B. Lin. An Efficient Identity-Based Cryptosystem for End-to-End Mobile Security. IEEE Trans. Wireless Comm., 5(9):2586-2593, September 2006.
    • (2006) IEEE Trans. Wireless Comm. , vol.5 , Issue.9 , pp. 2586-2593
    • Hwu, J.-S.1    Chen, R.-J.2    Lin, Y.-B.3
  • 25
    • 0003704494 scopus 로고    scopus 로고
    • Version 3. May
    • IETF Network Working Group. Post Office Protocol - Version 3. http://www.ietf.org/rfc/rfc1939.txt, May 1996.
    • (1996) Post Office Protocol
  • 26
    • 0003833905 scopus 로고    scopus 로고
    • Version 4, rev1. March
    • IETF Network Working Group. Internet Message Access Protocol - Version 4, rev1. http://www.ietf.org/rfc/rfc1939.txt, March 2003.
    • (2003) Internet Message Access Protocol
  • 29
    • 37249029813 scopus 로고    scopus 로고
    • February
    • S. Jobs. Thoughts on Music. http://www.apple.com/hotnews/thoughtsonmusic/ , February 2007.
    • (2007) Thoughts on Music
    • Jobs, S.1
  • 33
    • 85170007143 scopus 로고    scopus 로고
    • version 6.0. (EXCHG.80).aspx, May
    • Microsoft Corporation. ActiveSync HTTP Protocol Specification, version 6.0. http://msdn.microsoft.com/en-us/library/dd299446(EXCHG.80).aspx, May 2010.
    • (2010) ActiveSync HTTP Protocol Specification
  • 34
    • 85170011243 scopus 로고    scopus 로고
    • June
    • Microsoft Corporation. Microsoft PlayReady. http://www.microsoft.com/ playready/default.mspx, June 2010.
    • (2010) Microsoft PlayReady
  • 37
    • 14844298063 scopus 로고    scopus 로고
    • Open Mobile Alliance Ltd. Version 1.0. Technical Report OMA-Download-DRMREL-V1-0-20040615-A, Open Mobile Alliance, June
    • Open Mobile Alliance Ltd. Rights Expression Language Version 1.0. Technical Report OMA-Download-DRMREL-V1-0-20040615-A, Open Mobile Alliance, June 2004.
    • (2004) Rights Expression Language
  • 39
    • 78751524896 scopus 로고    scopus 로고
    • Open Mobile Alliance Ltd. Version 2.0.2. Technical Report OMA-TS-DRM REL-V2-0-2-20080723-A, Open Mobile Alliance, July
    • Open Mobile Alliance Ltd. DRM Rights Expression Language Version 2.0.2. Technical Report OMA-TS-DRM REL-V2-0-2-20080723-A, Open Mobile Alliance, July 2008.
    • (2008) DRM Rights Expression Language
  • 42
  • 46
    • 77950673302 scopus 로고    scopus 로고
    • Securing Android-Powered Mobile Devices Using SELinux
    • A. Shabtai, Y. Fledel, and Y. Elovici. Securing Android-Powered Mobile Devices Using SELinux. IEEE Security and Privacy, 8:36-44, 2010.
    • (2010) IEEE Security and Privacy , vol.8 , pp. 36-44
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3
  • 49
    • 70749096362 scopus 로고    scopus 로고
    • TCG. Specification Version 1.2, Level 2 Revision 103
    • TCG. TPM Main: Part 1 - Design Principles. Specification Version 1.2, Level 2 Revision 103. 2007.
    • (2007) TPM Main: Part 1 - Design Principles
  • 51
    • 56749160373 scopus 로고    scopus 로고
    • A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks
    • Z. Wan, K. Ren, and B. Preneel. A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks. In Proceedings of ACM WiSec, 2008.
    • Proceedings of ACM WiSec, 2008
    • Wan, Z.1    Ren, K.2    Preneel, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.