Enhanced micro-TCB approach for smartphone security.
Munam Ali ShahIrfan AzamMuhammad Qasim KhanSijing ZhangPublished in: ICAC (2014)
Keyphrases
- insider attacks
- trusted computing
- network security
- information security
- intrusion detection
- security problems
- security mechanisms
- security issues
- access control
- mobile applications
- mobile devices
- security requirements
- key management
- daily life
- statistical databases
- security policies
- early detection
- functional requirements
- security systems
- security properties
- security architecture
- cloud computing
- information assurance