Nalaganje...

Mobile platform security /

Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and...

Popoln opis

Bibliografske podrobnosti
Main Authors: Asokan, N. (Author), Davi, Lucas (Author), Dmitrienko, Alexandra (Author), Heuser, Stephan (Author), Kostiainen, Kari (Author), Reshetova, Elena (Author), Sadeghi, Ahmad-Reza (Author)
Format: eKnjiga
Jezik:English
Izdano: San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, 2014.
Serija:Synthesis digital library of engineering and computer science.
Synthesis lectures on information security, privacy, and trust ; # 9.
Teme:
Online dostop:Abstract with links to full text
LEADER 06162nam a2200745 i 4500
001 201312SPT009
005 20160320103534.0
006 m eo d
007 cr cn |||m|||a
008 140113s2014 caua foab 000 0 eng d
020 |a 9781627050982  |q (ebook) 
020 |z 9781627050975  |q (paperback) 
024 7 |a 10.2200/S00555ED1V01Y201312SPT009  |2 doi 
035 |a (CaBNVSL)swl00403032 
035 |a (OCoLC)868156289 
040 |a CaBNVSL  |b eng  |e rda  |c CaBNVSL  |d CaBNVSL 
050 4 |a TK5103.2  |b .A854 2014 
082 0 4 |a 621.384  |2 23 
100 1 |a Asokan, N.,  |e author. 
245 1 0 |a Mobile platform security /  |c N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi. 
264 1 |a San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :  |b Morgan & Claypool,  |c 2014. 
300 |a 1 PDF (xii, 96 pages) :  |b illustrations. 
336 |a text  |2 rdacontent 
337 |a electronic  |2 isbdmedia 
338 |a online resource  |2 rdacarrier 
490 1 |a Synthesis lectures on information security, privacy, & trust,  |x 1945-9750 ;  |v # 9 
500 |a Part of: Synthesis digital library of engineering and computer science. 
500 |a Series from website. 
504 |a Includes bibliographical references (pages 83-94). 
505 0 |a 1. Introduction -- 1.1 Mobile security history -- 1.2 Book overview --  
505 8 |a 2. Platform security model -- 2.1 Stakeholders -- 2.2 Mobile software architecture -- 2.3 Platform security model -- 2.3.1 Software deployment -- 2.3.2 Application installation -- 2.3.3 Runtime protection -- 2.3.4 Platform management --  
505 8 |a 3. Mobile platforms -- 3.1 Java ME -- 3.2 Symbian -- 3.3 Android -- 3.4 iOS -- 3.5 MeeGo -- 3.6 Windows phone --  
505 8 |a 4. Platform comparison -- 4.1 Software deployment -- 4.1.1 Distribution model and application signing -- 4.1.2 Application identification -- 4.1.3 Permission request -- 4.1.4 Access control declaration and scope -- 4.1.5 Access control granularity -- 4.2 Application installation -- 4.2.1 Permission assignment -- 4.2.2 Permission presentation -- 4.2.3 Application updates -- 4.3 Runtime protection -- 4.3.1 Runtime permissions -- 4.3.2 Access control enforcement -- 4.3.3 Execution protection -- 4.3.4 Application data protection -- 4.3.5 Hardware security APIs -- 4.4 Platform management -- 4.4.1 Platform boot integrity -- 4.4.2 Platform data integrity -- 4.4.3 Platform updates and device management -- 4.5 Device rooting -- 4.5.1 iOS -- 4.5.2 Android -- 4.5.3 Other mobile operating systems --  
505 8 |a 5. Mobile hardware security -- 5.1 Platform boot integrity -- 5.1.1 Secure boot -- 5.1.2 Authenticated boot -- 5.2 Secure storage -- 5.3 Isolated execution -- 5.4 Device identification -- 5.5 Device authentication -- 5.6 Hardware security architectures -- 5.7 TEE standards --  
505 8 |a 6. Enterprise security extensions -- 6.1 Enterprise security extension model -- 6.1.1 Infrastructure components -- 6.1.2 On-device components -- 6.2 Selected commercial solutions -- 6.2.1 Application level extensions -- 6.2.2 Platform level extensions -- 6.2.3 Mobile device management software --  
505 8 |a 7. Platform security research -- 7.1 Android-based platform security research -- 7.1.1 Attacks and threats -- 7.1.2 Security extensions for Android -- 7.2 Platform security research on iOS -- 7.2.1 Limits of Apple's application vetting process -- 7.2.2 iOS security extensions -- 7.3 Discussion --  
505 8 |a 8. Conclusions -- Bibliography -- Authors' biographies. 
506 |a Abstract freely available; full-text restricted to subscribers or individual document purchasers. 
510 0 |a Compendex 
510 0 |a Google book search 
510 0 |a Google scholar 
510 0 |a INSPEC 
520 3 |a Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners. 
530 |a Also available in print. 
538 |a Mode of access: World Wide Web. 
538 |a System requirements: Adobe Acrobat Reader. 
588 |a Title from PDF title page (viewed on January 13, 2014). 
650 0 |a Mobile communication systems  |x Security measures. 
653 |a hardware security 
653 |a mobile devices 
653 |a operating system security 
653 |a platform security architectures 
700 1 |a Davi, Lucas.,  |e author. 
700 1 |a Dmitrienko, Alexandra.,  |e author. 
700 1 |a Heuser, Stephan.,  |e author. 
700 1 |a Kostiainen, Kari.,  |e author. 
700 1 |a Reshetova, Elena.,  |e author. 
700 1 |a Sadeghi, Ahmad-Reza.,  |e author. 
776 0 8 |i Print version:  |z 9781627050975 
830 0 |a Synthesis digital library of engineering and computer science. 
830 0 |a Synthesis lectures on information security, privacy, and trust ;  |v # 9.  |x 1945-9750 
856 4 8 |3 Abstract with links to full text  |u http://dx.doi.org/10.2200/S00555ED1V01Y201312SPT009 
942 |c EB 
999 |c 81075  |d 81075 
952 |0 0  |1 0  |4 0  |7 0  |9 73095  |a MGUL  |b MGUL  |d 2016-03-20  |l 0  |r 2016-03-20  |w 2016-03-20  |y EB