000695283 000__ 02608cam\a2200493Ii\4500 000695283 001__ 695283 000695283 005__ 20230306135429.0 000695283 006__ m\\\\\o\\d\\\\\\\\ 000695283 007__ cr\cnu---unuuu 000695283 008__ 130905t20132014xxua\\\\ob\\\\000\0\eng\d 000695283 020__ $$a9781461481904 $$qelectronic book 000695283 020__ $$a1461481902 $$qelectronic book 000695283 020__ $$z9781461481898 000695283 0247_ $$a10.1007/978-1-4614-8190-4$$2doi 000695283 035__ $$aSP(OCoLC)ocn857663082 000695283 035__ $$aSP(OCoLC)857663082 000695283 040__ $$aGW5XE$$erda$$epn$$cGW5XE$$dYDXCP$$dCOO$$dN$T 000695283 049__ $$aISEA 000695283 050_4 $$aQA76.9.A25 000695283 08204 $$a005.8$$223 000695283 1001_ $$aVasudevan, Amit,$$eauthor. 000695283 24510 $$aTrustworthy execution on mobile devices$$h[electronic resource] /$$cAmit Vasudevan, Jonathan M. McCune, James Newsome. 000695283 264_1 $$aNew York, NY :$$bSpringer,$$c[2013?] 000695283 264_4 $$c©2014 000695283 300__ $$a1 online resource (xiii, 85 pages) :$$billustrations. 000695283 336__ $$atext$$btxt$$2rdacontent 000695283 337__ $$acomputer$$bc$$2rdamedia 000695283 338__ $$aonline resource$$bcr$$2rdacarrier 000695283 4901_ $$aSpringerBriefs in computer science,$$x2191-5768 000695283 504__ $$aIncludes bibliographical references. 000695283 5050_ $$aDemand for Applications Requiring Hardware Security -- Desired Security Features -- Available Hardware Primitives -- Isolated Execution Environments -- API Architectures -- Analysis and Recommendations -- Summary. 000695283 506__ $$aAccess limited to authorized users. 000695283 520__ $$aThis brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results. 000695283 588__ $$aDescription based on online resource; title from PDF title page (SpringerLink, viewed August 20, 2013). 000695283 650_0 $$aComputer security. 000695283 650_0 $$aMobile computing. 000695283 650_0 $$aMobile communication systems$$xSecurity measures. 000695283 7001_ $$aMcCune, Jonathan M.,$$eauthor. 000695283 7001_ $$aNewsome, James,$$eauthor. 000695283 830_0 $$aSpringerBriefs in computer science,$$x2191-5768 000695283 85280 $$bebk$$hSpringerLink 000695283 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-1-4614-8190-4$$zOnline Access 000695283 909CO $$ooai:library.usi.edu:695283$$pGLOBAL_SET 000695283 980__ $$aEBOOK 000695283 980__ $$aBIB 000695283 982__ $$aEbook 000695283 983__ $$aOnline 000695283 994__ $$a92$$bISE