Show simple item record

dc.contributor.advisorWhittaker, James
dc.contributor.authorSamarah, Mohammad
dc.contributor.authorWhittaker, James
dc.date.accessioned2013-11-01T18:22:07Z
dc.date.available2013-11-01T18:22:07Z
dc.date.issued2001-12-04
dc.identifier.citationSamarah, M., Whittaker, J. (2001). Survivable mobile operating system (CS-2001-05). Melbourne, FL Florida Institute of Technology.en_US
dc.identifier.otherCS-2001-05
dc.identifier.urihttp://hdl.handle.net/11141/95
dc.description.abstractAlthough there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues in mobile system contexts. Conventional security controls work well for static code, but break down with code mobility. In this paper, we investigate the need for end-to-end security in mobile and wireless operating systems. We study the implications of mobility - specifically, ways in which the operating system may facilitate communication security. We suggest a framework for designing security into mobile devices by building encryption into the mobile device thus providing end-to-end security and eliminating carrier-provided encryption overhead.en_US
dc.language.isoen_USen_US
dc.rightsCopyright held by authors.en_US
dc.titleSurvivable mobile operating systemen_US
dc.typeTechnical Reporten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record