A mere formality

Access Full Text

A mere formality

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Engineering & Technology — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Mobile phone security gets a boost from a formally proven hypervisor program. We all know about the security challenges of personal computers: they get hacked, viruses hijack machines, and keystroke loggers steal passwords that then end up on public Web sites. Yet the amount of security-critical transactions conducted on such systems is steadily increasing. Now think about smart phones and so-called mobile Internet devices, which are increasingly being used for critical transactions and which may replace PCs as the access device of choice for most Web services. These devices are, in many respects, starting to resemble PCs albeit with a much more convenient form factor. Does this mean that they will be as prone to security exploits, and that we are heading towards full-scale disaster as far as the security of our Web services is concerned? We might be, if we don't do something about it. The good news is that the technology to protect us exists.

Inspec keywords: microcomputers; virtual machines; computer viruses; formal verification; mobile handsets; operating system kernels; Web services; Web sites; security of data; telecommunication security

Other keywords: hypervisor program; virtual machine kernel; viruses; mobile phone security protection; security-critical transactions; mobile Internet devices; Web sites; Web services; personal computers; smart phones

Subjects: Operating systems; Data security; Formal methods; Mobile radio systems

http://iet.metastore.ingenta.com/content/journals/10.1049/et.2009.1917
Loading

Related content

content/journals/10.1049/et.2009.1917
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading