-
2
-
-
79960158106
-
Model driven configuration of secure operating systems for mobile applications in healthcare
-
Agreiter, B., Alam, M., Hafner, M., Seifert, J. P., and Zhang, X. (2007). Model driven configuration of secure operating systems for mobile applications in healthcare. In Proceedings of the 1st International Workshop on Mode-Based Trustworthy Health Information Systems.
-
(2007)
Proceedings of the 1st International Workshop on Mode-Based Trustworthy Health Information Systems
-
-
Agreiter, B.1
Alam, M.2
Hafner, M.3
Seifert, J.P.4
Zhang, X.5
-
4
-
-
0004200684
-
-
Technical Report ESD-TR-73-51, AFSC, Hanscom AFB, Bedford, MA. AD-758 206, ESD/AFSC
-
Anderson, J. (1972). Computer security technology planning study. Technical Report ESD-TR-73-51, AFSC, Hanscom AFB, Bedford, MA. AD-758 206, ESD/AFSC.
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.1
-
5
-
-
79960187088
-
-
Project website
-
Android Open Source Project (2010). Project website. http://www.android. com.
-
(2010)
-
-
-
6
-
-
79960198979
-
-
Apple Inc. (2010). iOS website. http://www.apple.com/iphone/ios4.
-
(2010)
IOS Website
-
-
-
8
-
-
77950360151
-
Near field communication and health: Turning a mobile phone into an interactive multipurpose assistant in healthcare scenarios
-
Biomedical Engineering Systems and Technologies, International Joint Conference, BIOSTEC 2009, Revised Selected Papers, Springer
-
Benelli, G. and Pozzebon, A. (2010). Near field communication and health: Turning a mobile phone into an interactive multipurpose assistant in healthcare scenarios. In Biomedical Engineering Systems and Technologies, International Joint Conference, BIOSTEC 2009, Revised Selected Papers, volume 52 of Communications in Computer and Information Science, pages 356-368. Springer.
-
(2010)
Communications in Computer and Information Science
, vol.52
, pp. 356-368
-
-
Benelli, G.1
Pozzebon, A.2
-
9
-
-
77954695078
-
-
Technical report, Sysgo
-
Brygier, J., Fuchsen, R., and Blasum, H. (2009). PikeOS: Safe and secure virtualization in a separation microkernel. Technical report, Sysgo.
-
(2009)
PikeOS: Safe and Secure Virtualization in A Separation Microkernel
-
-
Brygier, J.1
Fuchsen, R.2
Blasum, H.3
-
11
-
-
0020778471
-
SCOMP: A solution to the multilevel security problem
-
Fraim, L. (1983). SCOMP: A solution to the multilevel security problem. In IEEE Computer, pages 26-34.
-
(1983)
IEEE Computer
, pp. 26-34
-
-
Fraim, L.1
-
12
-
-
74049088125
-
TruWallet: Trustworthy and migratable wallet-based web authentication
-
ACM
-
Gajek, S., Löhr, H., Sadeghi, A.-R., and Winandy, M. (2009). TruWallet: Trustworthy and migratable wallet-based web authentication. In The 2009 ACM Workshop on Scalable Trusted Computing (STC'09), pages 19-28. ACM.
-
(2009)
The 2009 ACM Workshop on Scalable Trusted Computing (STC'09)
, pp. 19-28
-
-
Gajek, S.1
Löhr, H.2
Sadeghi, A.-R.3
Winandy, M.4
-
13
-
-
79960176443
-
-
Google Android (2010). Security and permissions. http://developer. android.com/intl/de/guide/topics/security/security.html.
-
(2010)
Security and Permissions
-
-
-
14
-
-
78049363201
-
THE-MUSS: Mobile u-health service system
-
Biomedical Engineering Systems and Technologies, International Joint Conference, BIOSTEC 2008, Revised Selected Papers, Springer
-
Han, D., Park, S., and Lee, M. (2008). THE-MUSS: Mobile u-health service system. In Biomedical Engineering Systems and Technologies, International Joint Conference, BIOSTEC 2008, Revised Selected Papers, volume 25 of Communications in Computer and Information Science, pages 377-389. Springer.
-
(2008)
Communications in Computer and Information Science
, vol.25
, pp. 377-389
-
-
Han, D.1
Park, S.2
Lee, M.3
-
15
-
-
79960160490
-
-
Hildon Application Framework Project website
-
Hildon Application Framework (2010). Project website. http://live.gnome.org/Hildon.
-
(2010)
-
-
-
17
-
-
0025137215
-
A VMM security kernel for the VAX architecture
-
Oakland, CA. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
Karger, P. A., Zurko, M. E., Bonin, D. W., Mason, A. H., and Kahn, C. E. (1990). A VMM security kernel for the VAX architecture. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 2-19, Oakland, CA. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(1990)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 2-19
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
18
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
ACM Press. To appear
-
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., and Winwood, S. (2009). seL4: Formal verification of an OS kernel. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles, Big Sky, MT, USA. ACM Press. To appear.
-
(2009)
Proceedings of the 22nd ACM Symposium on Operating Systems Principles, Big Sky, MT, USA
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
19
-
-
77954717010
-
Key attestation from trusted execution environments
-
Springer
-
Kostiainen, K., Dmitrienko, A., Ekberg, J.-E., Sadeghi, A.-R., and Asokan, N. (2010). Key attestation from trusted execution environments. In TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, pages 30-46. Springer.
-
(2010)
TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
, pp. 30-46
-
-
Kostiainen, K.1
Dmitrienko, A.2
Ekberg, J.-E.3
Sadeghi, A.-R.4
Asokan, N.5
-
20
-
-
74049088382
-
On-board credentials with open provisioning
-
ACM
-
Kostiainen, K., Ekberg, J.-E., Asokan, N., and Rantala, A. (2009). On-board credentials with open provisioning. In ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pages 104-115. ACM.
-
(2009)
ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
, pp. 104-115
-
-
Kostiainen, K.1
Ekberg, J.-E.2
Asokan, N.3
Rantala, A.4
-
21
-
-
0002970064
-
On microkernel construction
-
Proceedings of the 15th ACM Symposium on Operating Systems Principles (SOSP'95), Copper Mountain Resort, Colorado.
-
Liedtke, J. (1995). On microkernel construction. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (SOSP'95), Copper Mountain Resort, Colorado. Appeared as ACM Operating Systems Review 29.5.
-
(1995)
Appeared As ACM Operating Systems Review
, vol.29
, Issue.5
-
-
Liedtke, J.1
-
23
-
-
79960153060
-
-
Project website
-
Lua(2010). Project website. http://www.lua.org.
-
(2010)
-
-
-
24
-
-
79960160838
-
-
Project website
-
Maemo(2010). Project website. http://maemo.org.
-
(2010)
-
-
-
25
-
-
79960196083
-
-
Microsoft (2010). Windows mobile website. http://www.microsoft.com/ windowsmobile.
-
(2010)
Windows Mobile Website
-
-
-
26
-
-
79960159702
-
-
Open Kernel Labs (2010). OKL4 project website. http://okl4.org.
-
(2010)
OKL4 Project Website
-
-
-
27
-
-
79960191266
-
-
Project website
-
Paros (2010). Project website. http://www.parosproxy.org.
-
(2010)
-
-
-
28
-
-
77954719036
-
Towards a trusted mobile desktop
-
Trust and Trustworthy Computing (TRUST 2010) Springer
-
Selhorst, M., Stüble, C., Feldmann, F., and Gnaida, U. (2010). Towards a trusted mobile desktop. In Trust and Trustworthy Computing (TRUST 2010), volume 6101 of LNCS, pages 78-94. Springer.
-
(2010)
LNCS
, vol.6101
, pp. 78-94
-
-
Selhorst, M.1
Stüble, C.2
Feldmann, F.3
Gnaida, U.4
-
29
-
-
77956328232
-
Open security issues in german healthcare telematics
-
INSTICC
-
Sunyaev, A., Leimeister, J. M., and Krcmar, H. (2010). Open security issues in german healthcare telematics. In HEALTHINF 2010 - Proceedings of the 3rd International Conference on Health Informatics, pages 187-194. INSTICC.
-
(2010)
HEALTHINF 2010 - Proceedings of the 3rd International Conference on Health Informatics
, pp. 187-194
-
-
Sunyaev, A.1
Leimeister, J.M.2
Krcmar, H.3
-
30
-
-
79960177711
-
-
Project website
-
Symbian Foundation Community (2010). Project website. http://www.symbian.org.
-
(2010)
-
-
-
33
-
-
77954740361
-
-
Trusted Computing Group (2009). TPM Main Specification. http://www.trustedcomputinggroup.org.
-
(2009)
TPM Main Specification
-
-
-
35
-
-
79960152502
-
Enabling the provision of secure web based m-health services utilizing xml based security models
-
Vouyioukas, D., Kambourakis, G., Maglogiannis, I., Rouskas, A., Kolias, C., and Gritzalis, S. (2008). Enabling the provision of secure web based m-health services utilizing xml based security models. Security and Communication Networks, 1(5):375-388.
-
(2008)
Security and Communication Networks
, vol.1
, Issue.5
, pp. 375-388
-
-
Vouyioukas, D.1
Kambourakis, G.2
Maglogiannis, I.3
Rouskas, A.4
Kolias, C.5
Gritzalis, S.6
|