Zitierlink:
Verlagslink DOI: https://doi.org/10.1109/EUC.2010.107
https://media.suub.uni-bremen.de/handle/elib/5522
Verlagslink DOI: https://doi.org/10.1109/EUC.2010.107

Secure Mobile Business Information Processing
Autor/Autorin: | Kuntze, Nicolai Rieke, Roland Diederich, Gunther Sethmann, Richard ![]() Sohr, Karsten ![]() Mustafa, Tanveer Detken, Kai-Oliver |
Zusammenfassung: | An ever increasing amount of functionality is incorporated into mobile phones-this trend will continue as new mobile phone platforms are more widely used such as the iPhone or Android. Along with this trend, however, new risks arise, especially for enterprises using mobile phones for security-critical applications such as business intelligence (BI). Although platforms like Android have implemented sophisticated security mechanisms, security holes have been reported. In addition, different stakeholders have access to mobile phones such as different enterprises, service providers, operators, or manufacturers. In order to protect security-critical business applications, a trustworthy mobile phone platform is needed. Starting with typical attack scenarios, we describe a security architecture for Android mobile phones based on the concepts of Trusted Computing. In particular, this architecture allows for a dynamic policy change to reflect the current environment the phone is being used in. |
Veröffentlichungsdatum: | 2010 | Startseite: | 672 | Endseite: | 678 | Dokumenttyp: | Konferenzbeitrag | Konferenz: | 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing | ISBN: | 978-1-4244-9719-5 | Zweitveröffentlichung: | no | Institution: | Hochschule Bremen | Fachbereich: | Hochschule Bremen - Fakultät 4: Elektrotechnik und Informatik |
Enthalten in den Sammlungen: | Bibliographie HS Bremen |
Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.