Trusted Mobile Computing
نویسندگان
چکیده
Mobility leads to unplanned interactions between computer systems as people use devices to access services in varied environments. Before two systems agree to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper we introduce trust overlays, a systematic approach to building such trust. Our solution exploits the increasing availability of trusted computing hardware on commodity systems, including portable computers. We report that key pieces of this solution are coming into place, for example systems that provide distributed mandatory access control. We also point out that difficult challenges remain, for example how to set compatible security policies across administrative domains.
منابع مشابه
Construction of Trusted Computing Platform Based on Android System
With the widespread use of Android mobile phones, the problems of security of phone become increasingly prominent. The Java technology architecture for trusted computing is a trend to solve the above problems. Through the analysis of the current Java platform trusted computing architecture and the security of Android operating system, the trusted platform architecture based on Android and Java ...
متن کاملTrusted Computing in DVB Architectures
We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trust anchor, e.g. a trusted platform module (TPM) into the set-top box or Conditional Access Module. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO) via trusted mobile devices, or with othe...
متن کاملTrusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
544 INTRODUCTION In recent years, mobile devices have replaced desktop PCs as the primary computing platform for many users. This trend is encouraged by convenient access to bank accounts, personal networks, and a wide range of networked resources through our tablets and mobile phones (see Fig. 1). Many organizations would like to use mobile devices in the work environment as a cost-savings and...
متن کاملTrusted Computing in Mobile Platforms Players, Usage Scenarios, and Interests
Trusted Computing for mobile platforms is considered important, and the approach of the TCG Mobile Phone Work Group is often seen as the most prominent one. However there are more initiatives, approaches, and players, especially in the mobile communications industry. We give an overview on the players and their interests as well as on the options trusted computing can offer and match both with ...
متن کاملTrusted Mobile Platforms
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (including mobile phones, PDAs, etc.). Secondly, we consider the possible applications of this technology in mobile devices, and how these applications can be supported using trusted computing technology. We focus in partic...
متن کاملGerman language title goes here Mobile security and trusted computing
Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the rel...
متن کامل