|
Volumn , Issue , 2010, Pages 672-678
|
Secure mobile business information processing
d
DECOIT GmbH
(Germany)
|
Author keywords
Android; Mobile business processing; Mobile trusted module; Trusted computing
|
Indexed keywords
ANDROID;
ATTACK SCENARIOS;
BUSINESS INTELLIGENCE;
CRITICAL APPLICATIONS;
CRITICAL BUSINESS;
DYNAMIC POLICY;
MOBILE BUSINESS;
MOBILE PHONE PLATFORMS;
MOBILE TRUSTED MODULE;
SECURITY ARCHITECTURE;
SECURITY HOLES;
SECURITY MECHANISM;
SERVICE PROVIDER;
TRUSTED COMPUTING;
DATA PROCESSING;
HUMAN COMPUTER INTERACTION;
MOBILE DEVICES;
MOBILE PHONES;
MOBILE TELECOMMUNICATION SYSTEMS;
ROBOTS;
SECURITY OF DATA;
TELEPHONE;
TELEPHONE SETS;
UBIQUITOUS COMPUTING;
CELLULAR TELEPHONE SYSTEMS;
|
EID: 79951792313
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/EUC.2010.107 Document Type: Conference Paper |
Times cited : (8)
|
References (11)
|