|
Showing 1 - 2 of
2 matches in All Departments
This brief considers the various stakeholders in today's mobile
device ecosystem, and analyzes why widely-deployed hardware
security primitives on mobile device platforms are inaccessible to
application developers and end-users. Existing proposals are also
evaluated for leveraging such primitives, and proves that they can
indeed strengthen the security properties available to applications
and users, without reducing the properties currently enjoyed by
OEMs and network carriers. Finally, this brief makes
recommendations for future research that may yield practical and
deployable results.
Trusting a computer for a security-sensitive task (such as checking
email or banking online) requires the user to know something about
the computer's state. We examine research on securely capturing a
computer's state, and consider the utility of this information both
for improving security on the local computer (e.g., to convince the
user that her computer is not infected with malware) and for
communicating a remote computer's state (e.g., to enable the user
to check that a web server will adequately protect her data).
Although the recent "Trusted Computing" initiative has drawn both
positive and negative attention to this area, we consider the older
and broader topic of bootstrapping trust in a computer. We cover
issues ranging from the wide collection of secure hardware that can
serve as a foundation for trust, to the usability issues that arise
when trying to convey computer state information to humans. This
approach unifies disparate research efforts and highlights
opportunities for additional work that can guide real-world
improvements in computer security.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Poor Things
Emma Stone, Mark Ruffalo, …
DVD
R449
R329
Discovery Miles 3 290
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.