Friday 26 October 2012

[1] Amazon EC2, http://aws.amazon.com/ec2/.
[2] Mcafee mobile security report 2009,
http://www.mcafee.com/us/local_content/reports/
mobile_security_report_2009.pdf.
[3] Oauth, http://oauth.net.
[4] Tcg mobile reference architecture specification,
https://www.trustedcomputinggroup.org/specs/mobilephone/tcgmobile-
reference-architecture-1.0.pdf.
[5] TCG Specification Architecture Overview.
https://www.trustedcomputinggroup.org.
[6] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz,
A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica,
and M. Zaharia. Above the clouds: A berkeley view of cloud
computing. Technical Report UCB/EECS-2009-28, 2009.
[7] R. K. Balan, M. Satyanarayanan, S. Park, and T. Okoshi.
Tactics-based remote execution for mobile computing. In
Proc. of MobiSys, 2003.
[8] B.-G. Chun and P. Maniatis. Augmented smartphone
applications through clone cloud execution. In USENIX
HotOS XII, 2009.
[9] L. S. Clair, J. Schiffman, T. Jaeger, and P. McDaniel.
Establishing and sustaining system integrity via root of trust
installation. In Proc. of ACSAC, 2007.
[10] S. Goyal and J. Carter. A lightweight secure cyber foraging
infrastructure for resource-constrained devices. In Proc. of
the IEEE Workshop on Mobile Computing Systems and
Applications.
[11] G. C. Hunt, M. L. Scott, G. C. Hunt, and M. L. Scott. The
coign automatic distributed partitioning system. In Proc. of
OSDI, 1999.
[12] M. Hypponen. State of cell phone malware in 2007,
http://www.usenix.org/events/sec07/tech/hypponen.pdf.
[13] J. McCune, S. Berger, R. Caceres, T. Jaeger, and R. Sailer.
Shamon: A system for distributed mandatory access control.
In Proc. of ACSAC, 2006.
[14] A. Messer, I. Greenberg, P. Bernadat, D. Milojicic, D. Chen,
T. Giuli, and X. Gu. Towards a distributed platform for
resource-constrained devices. Technical Report
HPL-2002-26, HP Laboratories, 2002.
[15] C. Pautasso, O. Zimmermann, and F. Leymann. Restful web
services vs. big web services: Making the right architectural
decision. In Proc. of WWW, 2008.
[16] R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn.
Attestation-based policy enforcement for remote access. In
Proc. of ACM CCS, 2004.
[17] N. Santos, K. P. Gummadi, and R. Rodrigues. Towards
trusted cloud computing. In USENIX HotCloud, 2009.
[18] E. Shi, A. Perrig, and L. V. Doorn. Bind: a fine-grained
attestation service for secure distributed systems. In Proc. of
IEEE Symposium on Security and Privacy, 2005.

No comments:

Post a Comment