메뉴 건너뛰기




Volumn , Issue , 2007, Pages 7-14

A trusted mobile phone reference architecture via secure kernel

Author keywords

Isolation; Secure kernel; Security architecture; SELinux; Trusted mobile computing

Indexed keywords

ARCHITECTURE; ENGINES; MOBILE COMPUTING; MOBILE SECURITY; SPECIFICATIONS; TRUSTED COMPUTING; VIRTUAL REALITY; VIRTUALIZATION;

EID: 79959568144     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314354.1314359     Document Type: Conference Paper
Times cited : (42)

References (36)
  • 1
    • 47749084213 scopus 로고    scopus 로고
    • Extending SELinux policy model and enforcement architecture for trusted platforms paradigms
    • M. Alam, M. Hafner, J.-P. Seifert, and X. Zhang. Extending SELinux Policy Model and Enforcement Architecture for Trusted Platforms Paradigms. In Annual SELinux Symposium 2007.
    • Annual SELinux Symposium 2007
    • Alam, M.1    Hafner, M.2    Seifert, J.-P.3    Zhang, X.4
  • 2
    • 85175134107 scopus 로고    scopus 로고
    • Apparmor. http://en.opensuse.org/AppArmor.
    • Apparmor
  • 3
    • 79959540407 scopus 로고    scopus 로고
    • A platform-level trust-architecture for hand-held devices
    • J. Brizek, M. Khan, J.-P. Seifert, and D.A. Wheeler. A Platform-level Trust-Architecture for Hand-held Devices. In CRASH (2005).
    • (2005) CRASH
    • Brizek, J.1    Khan, M.2    Seifert, J.-P.3    Wheeler, D.A.4
  • 4
    • 84941286748 scopus 로고    scopus 로고
    • CDS Framework IDE. http://oss.tresys.com/projects/cdsframework.
    • CDS Framework IDE
  • 7
    • 85175131973 scopus 로고    scopus 로고
    • Limo foundation. https://www.limofoundation.org.
  • 9
    • 85175132183 scopus 로고    scopus 로고
    • Open Mobile Alliance. http://www.openmobilealliance.org.
  • 12
    • 85175129594 scopus 로고    scopus 로고
    • The Linux Intrusion Defence System (LIDS). http://www.lids.org/.
  • 20
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland, CA, May
    • D.D. Clark and D.R. Wilson. A comparison of commercial and military computer security policies. In Proceedings of IEEE Symposium on Security and Privacy, pages 184-194, Oakland, CA, May 1987.
    • (1987) Proceedings of IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 23
    • 21644455412 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pages 193-206, Bolton Landing, New York, USA, October 19-22 2003. (Pubitemid 40929697)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 193-206
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 26
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the linux operating system
    • June 25-30
    • P. Loscocco and S. Smalley. Integrating flexible support for security policies into the linux operating system. In Proceedings of USENIX Annual Technical Conference, pages 29 - 42, June 25-30 2001.
    • (2001) Proceedings of USENIX Annual Technical Conference , pp. 29-42
    • Loscocco, P.1    Smalley, S.2
  • 29
    • 51949104786 scopus 로고    scopus 로고
    • OMTP. Application security framework. http://www.omtp.org/docs/OMTP- Application-Security-Framework-v2-0.pdf, 2007.
    • (2007) Application Security Framework
  • 32
  • 33
    • 35048881059 scopus 로고    scopus 로고
    • Taming "Trusted Platforms" by Operating System Design
    • Information Security Applications
    • A. Sadeghi and C. Stuble. Taming trusted platforms by operating system design. In Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908, pages 286-302, Berlin, Germany, August 2003. (Pubitemid 38192018)
    • (2003) Lectures Notes in Computer Science , Issue.2908 , pp. 286-302
    • Sadeghi, A.-R.1    Stuble, C.2
  • 34
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, pages 223-238, 2004.
    • (2004) USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 35
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 36
    • 85175130908 scopus 로고    scopus 로고
    • SEFramework: A new policy development framework and tool to support security engineering
    • A. Wilson. SEFramework: A new policy development framework and tool to support security engineering. In Proc. of SELinux Symposium, 2005.
    • (2005) Proc. of SELinux Symposium
    • Wilson, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.