1 |
Trusted Computing Group, TCG Specification Architecture Overview Specification, revision 1.4, Aug., 2007.
|
2 |
P. Barham et al., "Xen and the Art of Virtualization," ACM SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164-177, Oct. 2003.
|
3 |
TCG, Mobile Trusted Module Specification, ver. 1.0, revision 6, June 2008.
|
4 |
S. M. Lee, S. B. Suh, and B. Jeong, S. Mo, "A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization," IEEE Consumer Communications and Networking Conference, pp. 251-256, Jan. 2008.
|
5 |
J. Y. Hwang and S. B. Suh, "Xen-On-ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones," IEEE Consumer Communications and Networking Conference, pp. 257-161, Jan. 2008.
|
6 |
NFC mobile service standard consortium, "Dynamic management of multi-application secure elements," White Paper, 2008.
|
7 |
R. Sailer, X. Zhang, T. Jeager, and L. Doorn, "Design and Implementation of a TCG-based Integrity Measurement Architecture," 13th USENIX Security Symposium, Vol. 13, Aug. 2004.
|
8 |
T. Garfinkel and B. Pfaff, "Terra: A Virtual Machine-Based Platform for Trusted Computing,'' SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles, Vol. 37, No. 5, pp. 193-206, 2003.
|
9 |
http://www.samsung.com/global/business/mobile/solution/security/samsung-knox
|
10 |
http://searchmobilecomputing.techtarget.com/definition/mobile-device-management
|
11 |
ARM Security Technology : Building a Secure System using TrustZone Technology, April 2009, ARM
|
12 |
TrustZone API Specification Version 3.0, February 2009, ARM
|
13 |
Changbok Jang, Euiin Choi, "Context Model Based on Ontology in Mobile Cloud Computing", Communications in Computer and Information Science, Vol. 199, pp. 146-151, 2011
DOI
|
14 |
Hongbin Liang, "Resource allocation for security services in mobile cloud computing", Computer Communications Workshops(INFOCOM WKSHPS), pp. 191-195, 2011
|
15 |
C. Linn and S. Debray, "Obfuscation of Executable Code to Improve Resistance to Static Disassembly," CCS '03 Proceedings of the 10th ACM conference on Computer and communications security, pp. 290-299, Oct. 2003.
|
16 |
Guan Le, Ke Xu, Song Meina, Song, Junde, "A Survey of Research on Mobile Cloud Computing", Computer and Information Science (ICIS), pp. 387-392, 2011
|
17 |
AMIT GOYAL and SARA DADIZADEH, "A Survey on Cloud Computing", University of British Columbia Technical Report for CS 508, 2009
|
18 |
Young-Ho Kim, Jeong-Nyeo Kim, "Building Secure Execution Environment for Mobile Platform Computers", 2011 First ACIS/JNU International Conference, IEEE, pp.119-122, 2011.
|
19 |
Young-Ho Kim, Yun-Kyung Lee, and Jeong-Nye Kim. "TeeMo: A Generic Trusted Execution Framework for Mobile Devices", Computers, Networks, Systems, and Industrial Application International Conference, SERSC, Vol. 8, pp. 579-583, 2012
|
20 |
J. Bickford, R. O'Hare, A. Baliga, V. Ganapathy, and L. Iftode, "Rootkits on Smart Phones: Attacks, Implications and Opportunities," HotMobile '10 Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 49-54, 2010.
|