Trusted Mobile Platforms

نویسندگان

  • Eimear Gallery
  • Chris J. Mitchell
چکیده

This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (including mobile phones, PDAs, etc.). Secondly, we consider the possible applications of this technology in mobile devices, and how these applications can be supported using trusted computing technology. We focus in particular on three mobile applications, namely OMA DRM, SIMLock, and software download.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trusted Computing in Mobile Platforms Players, Usage Scenarios, and Interests

Trusted Computing for mobile platforms is considered important, and the approach of the TCG Mobile Phone Work Group is often seen as the most prominent one. However there are more initiatives, approaches, and players, especially in the mobile communications industry. We give an overview on the players and their interests as well as on the options trusted computing can offer and match both with ...

متن کامل

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module

544 INTRODUCTION In recent years, mobile devices have replaced desktop PCs as the primary computing platform for many users. This trend is encouraged by convenient access to bank accounts, personal networks, and a wide range of networked resources through our tablets and mobile phones (see Fig. 1). Many organizations would like to use mobile devices in the work environment as a cost-savings and...

متن کامل

Improving trust in cloud, enterprise, and mobile computing platforms

Trust plays a fundamental role in the adoption of technology by society. Potential consumers tend to avoid a particular technology whenever they feel suspicious about its ability to cope with their security demands. Such a loss of trust could occur in important computing platforms, namely cloud, enterprise, and mobile platforms. In this thesis, we aim to improve trust in these platforms by (i) ...

متن کامل

Analyzing Trusted Elements in Mobile Devices

Since last two decades, we have witnessed a significant trend from PC to mobile devices. The primary focus of this shift on mobile devices is making a device personal to the user, but, unfortunately, neglecting the trustworthiness of mobile devices. Mobile devices consist of many elements in hardware, software (firmware) and a combination of both. Some of these elements on mobile devices are tr...

متن کامل

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms

Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. Protection mechanisms are required in order to hide activities of the trusted platforms when performing cryptography based transactions over the Internet, which would otherwise compromise the platform’s privacy and with it the users’s anonymity. In order to address this problem, the Trusted Compu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007