Normal view MARC view ISBD view

Mobile Platform Security [electronic resource] / by N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi.

By: Asokan, N [author.].
Contributor(s): Davi, Lucas [author.] | Dmitrienko, Alexandra [author.] | Heuser, Stephan [author.] | Kostiainen, Kari [author.] | Reshetova, Elena [author.] | Sadeghi, Ahmad-Reza [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Synthesis Lectures on Information Security, Privacy, and Trust: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014Edition: 1st ed. 2014.Description: XII, 96 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031023415.Subject(s): Data protection | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Preface -- Introduction -- Platform Security Model -- Mobile Platforms -- Platform Comparison -- Mobile Hardware Security -- Enterprise Security Extensions -- Platform Security Research -- Conclusions -- Bibliography -- Authors' Biographies .
In: Springer Nature eBookSummary: Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.
    average rating: 0.0 (0 votes)
No physical items for this record

Preface -- Introduction -- Platform Security Model -- Mobile Platforms -- Platform Comparison -- Mobile Hardware Security -- Enterprise Security Extensions -- Platform Security Research -- Conclusions -- Bibliography -- Authors' Biographies .

Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.

There are no comments for this item.

Log in to your account to post a comment.