Mobile Trusted Computing
نویسندگان
چکیده
منابع مشابه
Trusted Mobile Computing
Mobility leads to unplanned interactions between computer systems as people use devices to access services in varied environments. Before two systems agree to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper we introduce trust overlays, a systematic approach to building such trust. Our solution exploits the increasing availabilit...
متن کاملTrusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to support more efficient ways to authenticate users and devices, potentially enabling novel services based on the security provided by the infrastructure. In this paper we exhibit some usage scenarios from the mobile dom...
متن کاملA Mobile service architecture utilising trusted computing
Convergence of access technologies potentially enables new mobile business scenarios. To enable them, trust between the stakeholders is a prerequisite, e.g., in the form of a cross-domain authentication infrastructure. Service architectures provide solutions for some of these needs. This paper proposes a use case combining the well understood techniques from the mobile domain with the upcoming ...
متن کاملMobile Trusted Computing Based on MTM
Trusted computing (TC) denotes a set of security-related hardware and software mechanisms that make a computing device work in a consistent manner, even in the presence of external attacks. For personal computers, TC typically is interpreted to be a software architecture designed around the trusted platform module (TPM), a hardware chip residing on the motherboard and implemented according to t...
متن کاملA mobile and portable trusted computing platform
The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In order to address this problem, we propose a mobile and portable trusted computing platform in a form of a USB device. First, we d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the IEEE
سال: 2014
ISSN: 0018-9219,1558-2256
DOI: 10.1109/jproc.2014.2332007