2011 IEEE 8th International Conference on E-Business Engineering 2011
DOI: 10.1109/icebe.2011.69
|View full text |Cite
|
Sign up to set email alerts
|

User Centric Security Model for Tamper-Resistant Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 76 publications
0
6
0
Order By: Relevance
“…This model gives the full power to the issuer [10] allowing him to pre-install, install, remove and manage the applications on the device. This model is service oriented.…”
Section: Icom Modelmentioning
confidence: 99%
“…This model gives the full power to the issuer [10] allowing him to pre-install, install, remove and manage the applications on the device. This model is service oriented.…”
Section: Icom Modelmentioning
confidence: 99%
“…Akram et al [7][8][9][10] aim to solve similar problem by different means -they propose a new paradigm to hand over the control and management of smartcard applications to the end-user. Similarly, Global Platform specifies a consumer-centric provisioning model where the user has more control over their isolated execution environments [28].…”
Section: Related Workmentioning
confidence: 99%
“…2). Recently, we are experimenting in utilizing very small computing platforms [6] as sensors, such as the Raspberry Pi [7]. A deployable bootable image is also under development.…”
Section: The Sensorsmentioning
confidence: 99%