Mobile security and trusted computing. / Mitchell, Chris J.

In: Information Technology, Vol. 48, 2006, p. 321-326.

Research output: Contribution to journalArticlepeer-review

Published

Standard

Mobile security and trusted computing. / Mitchell, Chris J.

In: Information Technology, Vol. 48, 2006, p. 321-326.

Research output: Contribution to journalArticlepeer-review

Harvard

Mitchell, CJ 2006, 'Mobile security and trusted computing', Information Technology, vol. 48, pp. 321-326. <http://www.chrismitchell.net/msatc2.pdf>

APA

Vancouver

Mitchell CJ. Mobile security and trusted computing. Information Technology. 2006;48:321-326.

Author

Mitchell, Chris J. / Mobile security and trusted computing. In: Information Technology. 2006 ; Vol. 48. pp. 321-326.

BibTeX

@article{376047c4b7ee4ec7ac2d2b74f2947c2a,
title = "Mobile security and trusted computing",
abstract = "Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevence of trusted computing technology to mobile security issues.",
keywords = "Security, mobility, ubiquitous computing, trusted computing",
author = "Mitchell, {Chris J}",
note = "This is the final draft version of the paper that appeared in the journal 'Information Technology', 48, 2006. This article is also available in German.",
year = "2006",
language = "English",
volume = "48",
pages = "321--326",
journal = "Information Technology",

}

RIS

TY - JOUR

T1 - Mobile security and trusted computing

AU - Mitchell, Chris J

N1 - This is the final draft version of the paper that appeared in the journal 'Information Technology', 48, 2006. This article is also available in German.

PY - 2006

Y1 - 2006

N2 - Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevence of trusted computing technology to mobile security issues.

AB - Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevence of trusted computing technology to mobile security issues.

KW - Security

KW - mobility

KW - ubiquitous computing

KW - trusted computing

M3 - Article

VL - 48

SP - 321

EP - 326

JO - Information Technology

JF - Information Technology

ER -