000 | 03802nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-031-02341-5 | ||
003 | DE-He213 | ||
005 | 20240730163909.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2014 sz | s |||| 0|eng d | ||
020 |
_a9783031023415 _9978-3-031-02341-5 |
||
024 | 7 |
_a10.1007/978-3-031-02341-5 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aAsokan, N. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981083 |
|
245 | 1 | 0 |
_aMobile Platform Security _h[electronic resource] / _cby N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 96 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aPreface -- Introduction -- Platform Security Model -- Mobile Platforms -- Platform Comparison -- Mobile Hardware Security -- Enterprise Security Extensions -- Platform Security Research -- Conclusions -- Bibliography -- Authors' Biographies . | |
520 | _aRecently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aDavi, Lucas. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981084 |
|
700 | 1 |
_aDmitrienko, Alexandra. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981085 |
|
700 | 1 |
_aHeuser, Stephan. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981086 |
|
700 | 1 |
_aKostiainen, Kari. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981087 |
|
700 | 1 |
_aReshetova, Elena. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981088 |
|
700 | 1 |
_aSadeghi, Ahmad-Reza. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981089 |
|
710 | 2 |
_aSpringerLink (Online service) _981090 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012136 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034695 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _981091 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02341-5 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85102 _d85102 |