Trustworthy Execution on Mobile Devices /

Saved in:
Bibliographic Details
Author / Creator:Vasudevan, Amit. author.
Imprint:New York, NY : Springer New York : Imprint: Springer, 2014.
Description:1 online resource.
Language:English
Series:SpringerBriefs in Computer Science, 2191-5768
SpringerBriefs in Computer Science,
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/9805405
Hidden Bibliographic Details
Other authors / contributors:McCune, Jonathan M. author.
Newsome, James. author.
ISBN:9781461481904
Summary:This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.
Other form:Printed edition: 9781461481898
Standard no.:10.1007/978-1-4614-8190-4

MARC

LEADER 00000nam a22000005i 4500
001 9805405
003 ICU
005 20140110122200.0
007 cr nn 008mamaa
008 130810s2014 xxu| s |||| 0|eng d
020 |a 9781461481904  |9 978-1-4614-8190-4 
024 7 |a 10.1007/978-1-4614-8190-4  |2 doi 
035 |a (Springer)978-1-4614-8190-4 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
090 |a QA76.9.A25 
100 1 |a Vasudevan, Amit.  |e author.  |1 http://viaf.org/viaf/224149066756565602853 
245 1 0 |a Trustworthy Execution on Mobile Devices /  |c by Amit Vasudevan, Jonathan M. McCune, James Newsome. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2014. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a SpringerBriefs in Computer Science,  |x 2191-5768 
505 0 |a Introduction -- Demand for Applications Requiring Hardware Security -- Desired Security Features -- Available Hardware Primitives -- Isolated Execution Environments -- API Architectures -- Analysis and Recommendations -- Summary. 
520 |a This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results. 
650 0 |a Computer science.  |0 http://id.loc.gov/authorities/subjects/sh89003285 
650 0 |a Computer Communication Networks. 
650 0 |a Data protection.  |0 http://id.loc.gov/authorities/subjects/sh85035859 
650 0 |a Data encryption (Computer science).  |0 http://id.loc.gov/authorities/subjects/sh94001524 
650 0 |a Telecommunication.  |0 http://id.loc.gov/authorities/subjects/sh85133270 
653 0 |a Systems and Data Security. 
653 0 |a Computer Communication Networks. 
653 0 |a Data Encryption. 
653 0 |a Communications Engineering, Networks. 
653 0 |a Computer Science. 
650 7 |a Computer security.  |2 fast  |0 http://id.worldcat.org/fast/fst00872484 
650 7 |a Mobile computing.  |2 fast  |0 http://id.worldcat.org/fast/fst01024221 
700 1 |a McCune, Jonathan M.  |e author.  |0 http://id.loc.gov/authorities/names/nb2011018533  |1 http://viaf.org/viaf/171493805 
700 1 |a Newsome, James.  |e author.  |1 http://viaf.org/viaf/241149066749965602833 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781461481898 
830 0 |a SpringerBriefs in Computer Science,  |x 2191-5768 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4614-8190-4 
903 |a HeVa 
035 |a (OCoLC)859157489 
929 |a eresource 
999 f f |i 8aa2576c-8094-594e-84eb-bbeb6e43ce71  |s 686daea0-a9c9-5095-99f1-134676c7162a 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u http://dx.doi.org/10.1007/978-1-4614-8190-4  |g ebooks  |i 7159765