Citation link:
Publisher DOI: https://doi.org/10.1109/EUC.2010.107
https://media.suub.uni-bremen.de/handle/elib/5522
Publisher DOI: https://doi.org/10.1109/EUC.2010.107

Secure Mobile Business Information Processing
Authors: | Kuntze, Nicolai Rieke, Roland Diederich, Gunther Sethmann, Richard ![]() Sohr, Karsten ![]() Mustafa, Tanveer Detken, Kai-Oliver |
Abstract: | An ever increasing amount of functionality is incorporated into mobile phones-this trend will continue as new mobile phone platforms are more widely used such as the iPhone or Android. Along with this trend, however, new risks arise, especially for enterprises using mobile phones for security-critical applications such as business intelligence (BI). Although platforms like Android have implemented sophisticated security mechanisms, security holes have been reported. In addition, different stakeholders have access to mobile phones such as different enterprises, service providers, operators, or manufacturers. In order to protect security-critical business applications, a trustworthy mobile phone platform is needed. Starting with typical attack scenarios, we describe a security architecture for Android mobile phones based on the concepts of Trusted Computing. In particular, this architecture allows for a dynamic policy change to reflect the current environment the phone is being used in. |
Issue Date: | 2010 | Start page: | 672 | End page: | 678 | Type: | Konferenzbeitrag | Conference: | 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing | ISBN: | 978-1-4244-9719-5 | Secondary publication: | no | Institution: | Hochschule Bremen | Faculty: | Hochschule Bremen - Fakultät 4: Elektrotechnik und Informatik |
Appears in Collections: | Bibliographie HS Bremen |
Items in Media are protected by copyright, with all rights reserved, unless otherwise indicated.