Mobile Security and Trusted Computing

被引:0
作者
Mitchell, Chris [1 ]
机构
[1] Royal Holloway Univ London, Egham TW20 0EX, Surrey, England
来源
IT-INFORMATION TECHNOLOGY | 2006年 / 48卷 / 06期
关键词
4.6 [Operating Systems: Security and Protection] security; mobility; ubiquitous computing; trusted computing;
D O I
10.1524/itit.2006.48.6.321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting` of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevance of trusted computing technology to mobile security issues.
引用
收藏
页码:321 / 326
页数:6
相关论文
共 10 条
[1]  
[Anonymous], 2005, 97986 ISOIEC
[2]   Improving the TCPA specification [J].
Arbaugh, B .
COMPUTER, 2002, 35 (08) :77-79
[3]  
Aura T., 2005, 3972 RFC INT SOC
[4]  
Beth T., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P3
[5]  
Gollmann D, 2005, COMPUTER SECURITY
[6]  
Menezes A., 1997, HDB APPL CRYPTOGRAPH
[7]  
Mitchell C., 2005, TRUSTED COMPUTING
[8]  
Mitchell C. J., 2004, SECURITY MOBILITY
[9]  
Pfleeger Charles P, 2002, SECURITY COMPUTING
[10]  
STAJANO F, 2002, SECURITY UBIQUITOUS