-
1
-
-
0001853125
-
The computer for the 21st century
-
Weiser, M.: The computer for the 21st century. Scientific American 265(3), 94-104 (1991)
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
2
-
-
84881631052
-
-
accessed April 15, 2011
-
Gartner: Gartner Newsroom (accessed April 15, 2011), http://www.gartner. com/it/page.jsp?id=1543014
-
Gartner Newsroom
-
-
-
3
-
-
84952737129
-
An abstract theory of computer viruses
-
Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
-
Adleman, L.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 354-374. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 354-374
-
-
Adleman, L.1
-
4
-
-
0024682488
-
Computational aspects of computer viruses
-
Cohen, F.: Computational aspects of computer viruses. Computers & Security 8(4), 325-344 (1989)
-
(1989)
Computers & Security
, vol.8
, Issue.4
, pp. 325-344
-
-
Cohen, F.1
-
5
-
-
0026156688
-
Directed graph epidemiological models of computer viruses
-
Lunt, T., et al. (eds.) IEEE Press, USA
-
Kephart, J., White, S.: Directed graph epidemiological models of computer viruses. In: Lunt, T., et al. (eds.) Proc. of IEEE Symposium on Research in Security and Privacy (SP), pp. 343-359. IEEE Press, USA (1991)
-
(1991)
Proc. of IEEE Symposium on Research in Security and Privacy (SP)
, pp. 343-359
-
-
Kephart, J.1
White, S.2
-
6
-
-
33750733586
-
Malware goes mobile
-
Hypponen, M.: Malware goes mobile. Scientific American 295(5), 70-77 (2006)
-
(2006)
Scientific American
, vol.295
, Issue.5
, pp. 70-77
-
-
Hypponen, M.1
-
7
-
-
84861551458
-
-
McAfee Labs, Technical Report December
-
McAfee Labs, 2011 Threats Predictions, Technical Report (December 2010)
-
(2010)
2011 Threats Predictions
-
-
-
8
-
-
80052820977
-
-
accessed April 15, 2011
-
Cisco: Cisco 2010 Annual Security Report (accessed April 15, 2011), http://www.cisco.com/en/US/prod/vpndevc/annual-security-report.html
-
Cisco 2010 Annual Security Report
-
-
-
9
-
-
84866140424
-
-
accessed April 15, 2011
-
Forrester: Forrester Research (accessed April 15, 2011), http://www.forrester.com/rb/Research/security-of-b2b-enabling-unbounded- enterprise/q/id/56670/t/2
-
Forrester Research
-
-
-
10
-
-
84881631052
-
-
accessed April 15, 2011
-
Gartner: Gartner Newsroom (accessed April 15, 2011), http://www.gartner. com/it/page.jsp?id=1529214
-
Gartner Newsroom
-
-
-
11
-
-
80052813996
-
-
accessed April 15, 2011
-
PAMPAS, Pioneering Advanced Mobile Privacy and Security (accessed April 15, 2011), http://www.pampas.eu.org/
-
-
-
-
13
-
-
80052794603
-
-
accessed April 15, 2011
-
GSM World, Mobile Privacy (accessed April 15, 2011), http://www.gsmworld. com/our-work/public-policy/mobile-privacy.htm
-
Mobile Privacy
-
-
-
14
-
-
80052809746
-
-
accessed April 15, 2011
-
Security on MSNBC, Malware infects more than 50 android apps (accessed April 15, 2011), http://www.msnbc.msn.com/id/41867328/ns/
-
Malware Infects More Than 50 Android Apps
-
-
-
15
-
-
0020299523
-
Security Policies and Security Models
-
Neumann, P. (ed.) IEEE Press, USA
-
Goguen, J., Mesajue, J.: Security Policies and Security Models. In: Neumann, P. (ed.) Proc. of the 1982 IEEE Symposium on Security and Privacy (SP), pp. 11-20. IEEE Press, USA (1982)
-
(1982)
Proc. of the 1982 IEEE Symposium on Security and Privacy (SP)
, pp. 11-20
-
-
Goguen, J.1
Mesajue, J.2
-
16
-
-
84882253377
-
-
Google, accessed April 15, 2011
-
Google, Security and Permissions (accessed April 15, 2011), http://developer.android.com/guide/topics/security/Security.html
-
Security and Permissions
-
-
-
17
-
-
84870892780
-
-
Google, accessed April 15, 2011
-
Google, Android Developers (accessed April 15, 2011), http://android-developers.blogspot.com/2010/06/exercising-our-remote- application.html
-
Android Developers
-
-
-
18
-
-
84882286921
-
-
RIM, accessed April 15, 2011
-
RIM, Security overview (accessed April 15, 2011), http://docs.blackberry. com/en/developers/deliverables/21091/Security-overview-1304155-11.jsp
-
Security Overview
-
-
-
19
-
-
80052794391
-
-
RIM, accessed April 15, 2011
-
RIM, Code Signing Keys (accessed April 15, 2011), http://us.blackberry. com/developers/javaappdev/codekeys.jsp
-
Code Signing Keys
-
-
-
20
-
-
80052818213
-
-
accessed April 15, 2011
-
Nokia, Symbian Platform Security Model (accessed April 15, 2011), http://wiki.forum.nokia.com/index.php/Symbian-Platform-Security-Model
-
Symbian Platform Security Model
-
-
-
21
-
-
80052792529
-
-
accessed April 15, 2011
-
Nokia, Symbian Signed Test Criteria V4 Wiki version (accessed April 15, 2011), http://wiki.forum.nokia.com/index.php/Symbian-Signed-Test-Criteria-V4- Wiki-version
-
Symbian Signed Test Criteria V4 Wiki Version
-
-
-
22
-
-
80052794010
-
-
accessed April 15, 2011
-
Nokia, Developer-certificate (accessed April 15, 2011), http://wiki.forum.nokia.com/index.php/Developer-certificate
-
Developer-certificate
-
-
-
23
-
-
80051999455
-
-
Nokia, Technical Report December
-
Nokia, OVI Publisher Guide, Technical Report (December 2010)
-
(2010)
OVI Publisher Guide
-
-
-
24
-
-
80052784796
-
-
iOS Dev Center accessed April 15, 2011
-
Apple, iOS Dev Center (accessed April 15, 2011), http://developer.apple. com/devcenter/ios/index.action
-
-
-
-
26
-
-
80052789807
-
-
Microsoft, Technical report December
-
Microsoft, Windows ® Phone 7 security model, Technical report (December 2010)
-
(2010)
Windows ® Phone 7 Security Model
-
-
-
27
-
-
80052791025
-
-
Microsoft, accessed April 15, 2011
-
Microsoft, App Hub (accessed April 15, 2011), http://create.msdn.com/en- US/home/about/developer-registration-walkthrough-confirmation
-
App Hub
-
-
-
29
-
-
80052796221
-
-
accessed April 15, 2011
-
Fluxcard, Fluxcard Fake ID (accessed April 15, 2011), http://www.fluxcard.com/
-
Fluxcard Fake ID
-
-
-
30
-
-
80052817613
-
-
accessed April 15, 2011
-
GeoTrust, GeoTrust Repository (accessed April 15, 2011), http://www.geotrust.com/resources/repository/legal/
-
GeoTrust Repository
-
-
-
31
-
-
80052813206
-
-
accessed April 15, 2011
-
GeoTrust, GeoTrust Technical Support (accessed April 15, 2011), https://knowledge.geotrust.com/support/knowledge-base/index?page=chatConsole
-
GeoTrust Technical Support
-
-
-
32
-
-
0041746887
-
-
European Parliament and of the Council of the European Union. Directive 1999/93/EC December
-
European Parliament and of the Council of the European Union. Community Framework for Electronic Signatures, Directive 1999/93/EC (December 1999)
-
(1999)
Community Framework for Electronic Signatures
-
-
-
33
-
-
84891838346
-
-
accessed April 15, 2011
-
Legislation.gov.uk, Computer Misuse Act 1990 (accessed April 15, 2011), http://www.legislation.gov.uk/ukpga/1990/18/contents
-
Computer Misuse Act 1990
-
-
-
34
-
-
77954619771
-
-
NIST, Technical Report FIPS PUB 180-3 October
-
NIST, Secure Hash Standard (SHS), Technical Report FIPS PUB 180-3 (October 2008)
-
(2008)
Secure Hash Standard (SHS)
-
-
|