메뉴 건너뛰기




Volumn , Issue , 2010, Pages 672-678

Secure mobile business information processing

Author keywords

Android; Mobile business processing; Mobile trusted module; Trusted computing

Indexed keywords

ANDROID; ATTACK SCENARIOS; BUSINESS INTELLIGENCE; CRITICAL APPLICATIONS; CRITICAL BUSINESS; DYNAMIC POLICY; MOBILE BUSINESS; MOBILE PHONE PLATFORMS; MOBILE TRUSTED MODULE; SECURITY ARCHITECTURE; SECURITY HOLES; SECURITY MECHANISM; SERVICE PROVIDER; TRUSTED COMPUTING;

EID: 79951792313     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EUC.2010.107     Document Type: Conference Paper
Times cited : (8)

References (11)
  • 1
    • 41549096799 scopus 로고    scopus 로고
    • A practical approach for establishing trust relationships between remote platforms using trusted computing
    • K. Dietrich, M. Pirker, T. Vejda, R. Toegl, T. Winkler, and P. Lipp. A practical approach for establishing trust relationships between remote platforms using trusted computing. Lecture Notes in Computer Science, 4912:156, 2008.
    • (2008) Lecture Notes in Computer Science , vol.4912 , pp. 156
    • Dietrich, K.1    Pirker, M.2    Vejda, T.3    Toegl, R.4    Winkler, T.5    Lipp, P.6
  • 10
  • 11
    • 70349253246 scopus 로고    scopus 로고
    • Trusted computing building blocks for embedded linux-based ARM trustzone platforms
    • ACM New York, NY, USA
    • J. Winter. Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In Proceedings of the 3rd ACM workshop on Scalable trusted computing, pages 21-30. ACM New York, NY, USA, 2008.
    • (2008) Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing , pp. 21-30
    • Winter, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.