Mobile security and trusted computing. / Mitchell, Chris J.
In: Information Technology, Vol. 48, 2006, p. 321-326.Research output: Contribution to journal › Article › peer-review
Mobile security and trusted computing. / Mitchell, Chris J.
In: Information Technology, Vol. 48, 2006, p. 321-326.Research output: Contribution to journal › Article › peer-review
}
TY - JOUR
T1 - Mobile security and trusted computing
AU - Mitchell, Chris J
N1 - This is the final draft version of the paper that appeared in the journal 'Information Technology', 48, 2006. This article is also available in German.
PY - 2006
Y1 - 2006
N2 - Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevence of trusted computing technology to mobile security issues.
AB - Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevence of trusted computing technology to mobile security issues.
KW - Security
KW - mobility
KW - ubiquitous computing
KW - trusted computing
M3 - Article
VL - 48
SP - 321
EP - 326
JO - Information Technology
JF - Information Technology
ER -