Survivable Mobile Operating System

نویسندگان

  • Mohammad Samarah
  • James Whittaker
چکیده

Although there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues in mobile system contexts. Conventional security controls work well for static code, but breakdown with code mobility. In this paper, we investigate the need for endto-end security in mobile and wireless operating systems. We study the implication of mobility – specifically, ways in which the operating system may facilitate communication security. We suggest a framework for designing security into mobile devices by building encryption into the mobile device thus providing end-to-end security and eliminating carrier-provided encryption overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Active Trust Management for Adaptive Survivable Systems (ATM for ASS’s)

The Problem: Computer systems are under attack as they have never been before. Every day computer systems around the world are compromised: data is stolen, security is breached, services are denied. These attacks are enabled by flaws in our current operating system, application code and middleware. It would be nice to replace all this with new software that is based on provably impenetrable tru...

متن کامل

AFRL-OSR-VA-TR-2013-0164 Survivable Software

The Survivable Software framework (SSW), developed under award AFOSR FA955009-1-0481, uses a synergistic combination of (1) compiler-assisted, aspect-oriented program instrumentation, (2) software monitoring with overhead control, (3) runtime verification with state estimation, and (4) adaptive runtime verification to closely monitor high-criticality monitor instances, thereby increasing the pr...

متن کامل

A Fast Strategy to Find Solution for Survivable Multicommodity ‎Network‎

This paper proposes an immediately efficient method, based on Benders Decomposition (BD), for solving the survivable capacitated network design problem. This problem involves selecting a set of arcs for building a survivable network at a minimum cost and within a satisfied flow. The system is subject to failure and capacity restriction. To solve this problem, the BD was initially proposed with ...

متن کامل

Topological Design of Survivable Wireless Access Networks

Wireless mobile networks have become crucial in providing untethered communication services to mobile users. In this paper, we propose an optimization model for the design of survivable wireless access networks. The main objective of the model is to optimize the network design cost of wireless backhaul networks while meeting survivability requirements. This paper also presents a simple and effi...

متن کامل

Experimental demonstration of building and operating QoS-aware survivable vSD-EONs with transparent resiliency.

Software-defined elastic optical networks (SD-EONs) provide operators more flexibility to customize their optical infrastructures dynamically. By leveraging infrastructure-as-a-service (IaaS), virtual SD-EONs (vSD-EONs) can be realized to further enhance the adaptivity of SD-EONs and shorten the time-to-market of new services. In this paper, we design and demonstrate the building and operating ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002