최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털융복합연구 = Journal of digital convergence, v.12 no.10, 2014년, pp.299 - 308
최휘민 (부산대학교 IT응용공학과) , 장창복 ((주)R2soft) , 김주만 (부산대학교 IT응용공학과)
Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply t...
Changbok Jang, Euiin Choi, "Context Model Based on Ontology in Mobile Cloud Computing", Communications in Computer and Information Science, Vol. 199, pp. 146-151, 2011
Hongbin Liang, "Resource allocation for security services in mobile cloud computing", Computer Communications Workshops(INFOCOM WKSHPS), pp. 191-195, 2011
Guan Le, Ke Xu, Song Meina, Song, Junde, "A Survey of Research on Mobile Cloud Computing", Computer and Information Science (ICIS), pp. 387-392, 2011
AMIT GOYAL and SARA DADIZADEH, "A Survey on Cloud Computing", University of British Columbia Technical Report for CS 508, 2009
Young-Ho Kim, Jeong-Nyeo Kim, "Building Secure Execution Environment for Mobile Platform Computers", 2011 First ACIS/JNU International Conference, IEEE, pp.119-122, 2011.
Young-Ho Kim, Yun-Kyung Lee, and Jeong-Nye Kim. "TeeMo: A Generic Trusted Execution Framework for Mobile Devices", Computers, Networks, Systems, and Industrial Application International Conference, SERSC, Vol. 8, pp. 579-583, 2012
J. Bickford, R. O'Hare, A. Baliga, V. Ganapathy, and L. Iftode, "Rootkits on Smart Phones: Attacks, Implications and Opportunities," HotMobile '10 Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 49-54, 2010.
Trusted Computing Group, TCG Specification Architecture Overview Specification, revision 1.4, Aug., 2007.
C. Linn and S. Debray, "Obfuscation of Executable Code to Improve Resistance to Static Disassembly," CCS '03 Proceedings of the 10th ACM conference on Computer and communications security, pp. 290-299, Oct. 2003.
P. Barham et al., "Xen and the Art of Virtualization," ACM SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164-177, Oct. 2003.
TCG, Mobile Trusted Module Specification, ver. 1.0, revision 6, June 2008.
S. M. Lee, S. B. Suh, and B. Jeong, S. Mo, "A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization," IEEE Consumer Communications and Networking Conference, pp. 251-256, Jan. 2008.
J. Y. Hwang and S. B. Suh, "Xen-On-ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones," IEEE Consumer Communications and Networking Conference, pp. 257-161, Jan. 2008.
NFC mobile service standard consortium, "Dynamic management of multi-application secure elements," White Paper, 2008.
R. Sailer, X. Zhang, T. Jeager, and L. Doorn, "Design and Implementation of a TCG-based Integrity Measurement Architecture," 13th USENIX Security Symposium, Vol. 13, Aug. 2004.
T. Garfinkel and B. Pfaff, "Terra: A Virtual Machine-Based Platform for Trusted Computing,'' SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles, Vol. 37, No. 5, pp. 193-206, 2003.
http://www.samsung.com/global/business/mobile/solution/security/samsung-knox
http://searchmobilecomputing.techtarget.com/definition/mobile-device-management
ARM Security Technology : Building a Secure System using TrustZone Technology, April 2009, ARM
TrustZone API Specification Version 3.0, February 2009, ARM
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.