Visualizations and Switching Mechanisms for Security Zones

Peter Riedl, Rene Mayrhofer, Koller Phillip, Andreas Möller, Marion Koelle, Matthias Kranz

Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

3 Zitate (Scopus)

Abstract

The ongoing evolution of mobile phones to “pocket comput- ers” generated a demand for more and more applications to be ported to the mobile phone. Because a full security assessment for a whole mobile operating system would be prohibitively costly, currently security critical applications can not be implemented. We address this challenge by in- troducing security zones to enable applications with high se- curity demands like driving licenses, health insurance cards, or passports on mobile phones. This zone concept creates the need for visualization of the current zone and a way to switch between zones. In this paper we discuss several possible ways of achieving this.
OriginalspracheEnglisch
TitelProceedings - 11th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2013
Herausgeber (Verlag)ACM Press
Seiten278-281
Seitenumfang4
ISBN (Print)978-1-4503-2106-8
DOIs
PublikationsstatusVeröffentlicht - 2013
Veranstaltung11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013) - Vienna, Österreich
Dauer: 2 Dez. 20134 Dez. 2013

Publikationsreihe

NameACM International Conference Proceeding Series

Konferenz

Konferenz11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013)
Land/GebietÖsterreich
OrtVienna
Zeitraum02.12.201304.12.2013

Fingerprint

Untersuchen Sie die Forschungsthemen von „Visualizations and Switching Mechanisms for Security Zones“. Zusammen bilden sie einen einzigartigen Fingerprint.

Zitieren