2014
DOI: 10.1147/jrd.2013.2289606
|View full text |Cite
|
Sign up to set email alerts
|

IBM Secure Enterprise Desktop

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…On the other hand, trusted boot lacks the enforcement of runtime verification [26]. Therefore, a software-only approach cannot fully secure software applications on mobile devices against cyberattacks, especially for operating systems with end-user access, which can be hacked [27]. A number of studies have proposed a dedicated security hardware-assisted solution, to customize trusted boot and thus to tackle the above problems [26][27][28].…”
Section: Operating System Levelmentioning
confidence: 99%
“…On the other hand, trusted boot lacks the enforcement of runtime verification [26]. Therefore, a software-only approach cannot fully secure software applications on mobile devices against cyberattacks, especially for operating systems with end-user access, which can be hacked [27]. A number of studies have proposed a dedicated security hardware-assisted solution, to customize trusted boot and thus to tackle the above problems [26][27][28].…”
Section: Operating System Levelmentioning
confidence: 99%