Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Secure mobile business information processing

: Kuntze, N.; Rieke, R.; Diederich, G.; Sethmann, R.; Sohr, K.; Mustafa, T.; Detken, K.-O.


International Federation for Information Processing -IFIP-; Institute of Electrical and Electronics Engineers -IEEE-:
IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010 : Hong Kong, China, 11 - 13 December 2010; Proceedings; including workshops/symposium papers
Piscataway: IEEE, 2010
ISBN: 978-0-7695-4322-2 (print)
ISBN: 978-1-4244-9719-5
International Conference on Embedded and Ubiquitous Computing (EUC) <2010, Hong Kong>
Fraunhofer SIT ()

An ever increasing amount of functionality is incorporated into mobile phones - this trend will continue as new mobile phone platforms are more widely used such as the iPhone or Android. Along with this trend, however, new risks arise, especially for enterprises using mobile phones for security-critical applications such as business intelligence (BI). Although platforms like Android have implemented sophisticated security mechanisms, security holes have been reported [9] In addition, different stakeholders have access to mobile phones such as different enterprises, service providers, operators, or manufacturers. In order to protect security-critical business applications, a trustworthy mobile phone platform is needed. Starting with typical attack scenarios, we describe a security architecture for Android mobile phones based on the concepts of Trusted Computing. In particular, this architecture allows for a dynamic policy change to reflect the current environment the pho ne is being used in.