Security

Model-Driven Security for Trusted Systems

Free registration required

Executive Summary

In this paper, the authors have classified stakeholders and objects, while concentrating on the specification for objects' usage at the stakeholder end. This will allow them to deploy their tools in an emulated environment, where these high level specifications will transform to platform independent administrative policies and administer the emulation in a dynamic manner. This paper will further lead them to investigate and provide tooling support for more granular semantically integrated control for stakeholders on their objects in a ubiquitous environment. They have concentrated on resources focusing the mobile platforms, taking Android as their case study. They base their work on top of recognized standards like that provided by Trusted Computing Group's Mobile Phone Working Group.

  • Format: PDF
  • Size: 308.99 KB