메뉴 건너뛰기




Volumn 6863 LNCS, Issue , 2011, Pages 49-61

A secure smartphone applications roll-out scheme

Author keywords

Mobile Applications; Security; Smartphone; Software Roll out

Indexed keywords

APPLICATION MANAGEMENT; COMMUNICATION DEVICE; MALWARES; MOBILE APPLICATIONS; SECURITY; SMALL SIZE; SMART PHONES; SYMBIAN;

EID: 80052791491     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22890-2_5     Document Type: Conference Paper
Times cited : (8)

References (35)
  • 1
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • Weiser, M.: The computer for the 21st century. Scientific American 265(3), 94-104 (1991)
    • (1991) Scientific American , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 2
    • 84881631052 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • Gartner: Gartner Newsroom (accessed April 15, 2011), http://www.gartner. com/it/page.jsp?id=1543014
    • Gartner Newsroom
  • 3
    • 84952737129 scopus 로고
    • An abstract theory of computer viruses
    • Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
    • Adleman, L.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 354-374. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.403 , pp. 354-374
    • Adleman, L.1
  • 4
    • 0024682488 scopus 로고
    • Computational aspects of computer viruses
    • Cohen, F.: Computational aspects of computer viruses. Computers & Security 8(4), 325-344 (1989)
    • (1989) Computers & Security , vol.8 , Issue.4 , pp. 325-344
    • Cohen, F.1
  • 5
    • 0026156688 scopus 로고
    • Directed graph epidemiological models of computer viruses
    • Lunt, T., et al. (eds.) IEEE Press, USA
    • Kephart, J., White, S.: Directed graph epidemiological models of computer viruses. In: Lunt, T., et al. (eds.) Proc. of IEEE Symposium on Research in Security and Privacy (SP), pp. 343-359. IEEE Press, USA (1991)
    • (1991) Proc. of IEEE Symposium on Research in Security and Privacy (SP) , pp. 343-359
    • Kephart, J.1    White, S.2
  • 6
    • 33750733586 scopus 로고    scopus 로고
    • Malware goes mobile
    • Hypponen, M.: Malware goes mobile. Scientific American 295(5), 70-77 (2006)
    • (2006) Scientific American , vol.295 , Issue.5 , pp. 70-77
    • Hypponen, M.1
  • 7
    • 84861551458 scopus 로고    scopus 로고
    • McAfee Labs, Technical Report December
    • McAfee Labs, 2011 Threats Predictions, Technical Report (December 2010)
    • (2010) 2011 Threats Predictions
  • 8
    • 80052820977 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • Cisco: Cisco 2010 Annual Security Report (accessed April 15, 2011), http://www.cisco.com/en/US/prod/vpndevc/annual-security-report.html
    • Cisco 2010 Annual Security Report
  • 9
    • 84866140424 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • Forrester: Forrester Research (accessed April 15, 2011), http://www.forrester.com/rb/Research/security-of-b2b-enabling-unbounded- enterprise/q/id/56670/t/2
    • Forrester Research
  • 10
    • 84881631052 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • Gartner: Gartner Newsroom (accessed April 15, 2011), http://www.gartner. com/it/page.jsp?id=1529214
    • Gartner Newsroom
  • 11
    • 80052813996 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • PAMPAS, Pioneering Advanced Mobile Privacy and Security (accessed April 15, 2011), http://www.pampas.eu.org/
  • 13
    • 80052794603 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • GSM World, Mobile Privacy (accessed April 15, 2011), http://www.gsmworld. com/our-work/public-policy/mobile-privacy.htm
    • Mobile Privacy
  • 14
  • 16
    • 84882253377 scopus 로고    scopus 로고
    • Google, accessed April 15, 2011
    • Google, Security and Permissions (accessed April 15, 2011), http://developer.android.com/guide/topics/security/Security.html
    • Security and Permissions
  • 17
    • 84870892780 scopus 로고    scopus 로고
    • Google, accessed April 15, 2011
    • Google, Android Developers (accessed April 15, 2011), http://android-developers.blogspot.com/2010/06/exercising-our-remote- application.html
    • Android Developers
  • 18
    • 84882286921 scopus 로고    scopus 로고
    • RIM, accessed April 15, 2011
    • RIM, Security overview (accessed April 15, 2011), http://docs.blackberry. com/en/developers/deliverables/21091/Security-overview-1304155-11.jsp
    • Security Overview
  • 19
    • 80052794391 scopus 로고    scopus 로고
    • RIM, accessed April 15, 2011
    • RIM, Code Signing Keys (accessed April 15, 2011), http://us.blackberry. com/developers/javaappdev/codekeys.jsp
    • Code Signing Keys
  • 20
    • 80052818213 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • Nokia, Symbian Platform Security Model (accessed April 15, 2011), http://wiki.forum.nokia.com/index.php/Symbian-Platform-Security-Model
    • Symbian Platform Security Model
  • 21
    • 80052792529 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • Nokia, Symbian Signed Test Criteria V4 Wiki version (accessed April 15, 2011), http://wiki.forum.nokia.com/index.php/Symbian-Signed-Test-Criteria-V4- Wiki-version
    • Symbian Signed Test Criteria V4 Wiki Version
  • 22
    • 80052794010 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • Nokia, Developer-certificate (accessed April 15, 2011), http://wiki.forum.nokia.com/index.php/Developer-certificate
    • Developer-certificate
  • 23
    • 80051999455 scopus 로고    scopus 로고
    • Nokia, Technical Report December
    • Nokia, OVI Publisher Guide, Technical Report (December 2010)
    • (2010) OVI Publisher Guide
  • 24
    • 80052784796 scopus 로고    scopus 로고
    • iOS Dev Center accessed April 15, 2011
    • Apple, iOS Dev Center (accessed April 15, 2011), http://developer.apple. com/devcenter/ios/index.action
  • 26
    • 80052789807 scopus 로고    scopus 로고
    • Microsoft, Technical report December
    • Microsoft, Windows ® Phone 7 security model, Technical report (December 2010)
    • (2010) Windows ® Phone 7 Security Model
  • 27
    • 80052791025 scopus 로고    scopus 로고
    • Microsoft, accessed April 15, 2011
    • Microsoft, App Hub (accessed April 15, 2011), http://create.msdn.com/en- US/home/about/developer-registration-walkthrough-confirmation
    • App Hub
  • 29
    • 80052796221 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • Fluxcard, Fluxcard Fake ID (accessed April 15, 2011), http://www.fluxcard.com/
    • Fluxcard Fake ID
  • 30
    • 80052817613 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • GeoTrust, GeoTrust Repository (accessed April 15, 2011), http://www.geotrust.com/resources/repository/legal/
    • GeoTrust Repository
  • 31
    • 80052813206 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • GeoTrust, GeoTrust Technical Support (accessed April 15, 2011), https://knowledge.geotrust.com/support/knowledge-base/index?page=chatConsole
    • GeoTrust Technical Support
  • 32
    • 0041746887 scopus 로고    scopus 로고
    • European Parliament and of the Council of the European Union. Directive 1999/93/EC December
    • European Parliament and of the Council of the European Union. Community Framework for Electronic Signatures, Directive 1999/93/EC (December 1999)
    • (1999) Community Framework for Electronic Signatures
  • 33
    • 84891838346 scopus 로고    scopus 로고
    • accessed April 15, 2011
    • Legislation.gov.uk, Computer Misuse Act 1990 (accessed April 15, 2011), http://www.legislation.gov.uk/ukpga/1990/18/contents
    • Computer Misuse Act 1990
  • 34
    • 77954619771 scopus 로고    scopus 로고
    • NIST, Technical Report FIPS PUB 180-3 October
    • NIST, Secure Hash Standard (SHS), Technical Report FIPS PUB 180-3 (October 2008)
    • (2008) Secure Hash Standard (SHS)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.