-
2
-
-
84890033350
-
Today's mobile security requires a new approach
-
N. Leavitt, "Today's Mobile Security Requires a New Approach," Computer, vol. 46, no. 11, pp. 16-19, 2013.
-
(2013)
Computer
, vol.46
, Issue.11
, pp. 16-19
-
-
Leavitt, N.1
-
3
-
-
84864062248
-
MOSES: Supporting operation modes on smartphones
-
G. Russello, M. Conti, B. Crispo, and E. Fernandes, "MOSES: supporting operation modes on smartphones," in Proc. of the 17th ACM Symp. on Access Control Models and Technologies, 2012, pp. 3-12.
-
(2012)
Proc. of the 17th ACM Symp. on Access Control Models and Technologies
, pp. 3-12
-
-
Russello, G.1
Conti, M.2
Crispo, B.3
Fernandes, E.4
-
4
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh, "Cells: a virtual mobile smartphone architecture," in Proc. of the 23th ACM Symp. on Operating Systems Principles, 2011, pp. 173-187.
-
(2011)
Proc. of the 23th ACM Symp. on Operating Systems Principles
, pp. 173-187
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
5
-
-
84881397551
-
A configurable and extensible security service architecture for smartphones
-
D. Titze, P. Stephanow, and J. Schutte, "A configurable and extensible security service architecture for smartphones," in Advanced Information Networking and Applications Workshops (WAINA), 2013 27th Int. Conf. on, 2013, pp. 1056-1062.
-
(2013)
Advanced Information Networking and Applications Workshops (WAINA), 2013 27th Int. Conf. on
, pp. 1056-1062
-
-
Titze, D.1
Stephanow, P.2
Schutte, J.3
-
6
-
-
84878702819
-
2TAC: Distributed access control architecture for
-
S. Chung, S. Chung, T. Escrig, Y. Bai, and B. Endicott-Popovsky, "2TAC: Distributed Access Control Architecture for" Bring Your Own Device" Security," in BioMedical Computing (BioMedCom), 2012 ASE/IEEE Int. Conf. on, 2012, pp. 123-126.
-
(2012)
Bring Your Own Device" Security," in BioMedical Computing (BioMedCom), 2012 ASE/ IEEE Int. Conf. on
, pp. 123-126
-
-
Chung, S.1
Chung, S.2
Escrig, T.3
Bai, Y.4
Endicott-Popovsky, B.5
-
7
-
-
84928031273
-
-
Cisco
-
"Cisco BYOD Smart Solution," Cisco, 2013. [Online]. Available: http://www.cisco.com/web/solutions/trends/byod smart solution/docs/byod smart solution aag.pdf
-
(2013)
Cisco BYOD Smart Solution
-
-
-
8
-
-
84889070358
-
Trusted execution environments on mobile devices
-
J.-E. Ekberg, K. Kostiainen, and N. Asokan, "Trusted execution environments on mobile devices," in Proc. of the 2013 ACM SIGSAC Conf. on Computer & Communications Security, 2013, pp. 1497-1498.
-
(2013)
Proc. of the 2013 ACM SIGSAC Conf. on Computer & Communications Security
, pp. 1497-1498
-
-
Ekberg, J.-E.1
Kostiainen, K.2
Asokan, N.3
-
9
-
-
84874579631
-
TrustDroid: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking
-
Z. Zhao and F. C. Colon Osono, "TrustDroid: Preventing the use of Smartphones for information leaking in corporate networks through the used of static analysis taint tracking," in Malicious and Unwanted Software (MALWARE), 2012 7th Int. Conf. on, 2012, pp. 135-143.
-
(2012)
Malicious and Unwanted Software (MALWARE), 2012 7th Int. Conf. on
, pp. 135-143
-
-
Zhao, Z.1
Colon Osono, F.C.2
-
15
-
-
84887242802
-
Mobilityfirst: A robust and trustworthy mobility-centric architecture for the future internet
-
D. Raychaudhuri, K. Nagaraja, and A. Venkataramani, "Mobilityfirst: a robust and trustworthy mobility-centric architecture for the future internet," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 16, no. 3, pp. 2-13, 2012.
-
(2012)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.16
, Issue.3
, pp. 2-13
-
-
Raychaudhuri, D.1
Nagaraja, K.2
Venkataramani, A.3
|