Security requirement for mobile virtualization

被引:0
|
作者
Lee, Hyunjung [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Informat Secur Grp, Suwon, Gyeonggi Do, South Korea
来源
关键词
mobile virtualization; mobile; security; CC; hypervisor;
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Once smartphones began entering the marketplace in 2007, it was only a matter of time before programs like Bring Your Own Device (BYOD) and the subsequent Corporate-Owned, Personally Enabled (COPE) began to arise. For mobile security, many company developed the various security product for mobile device (MDM, MAM, Mobile antivirus, mobile virtualization etc). Mobile virtualization among various security products offers an extensible feature set that supports enterprise business needs for mobile security and management and Personal needs for mobile usability. This paper analyzes the mobile environment and intends to derive security functional requirements for a Mobile Virtualization based on the Common Criteria V3.1.
引用
收藏
页码:217 / 228
页数:12
相关论文
共 50 条
  • [1] Towards Improving the Security of Mobile Systems using Virtualization and Isolation
    Eppler, Jeremias
    Wang, Yong
    PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [2] Improving Mobile Device Security with Operating System-Level Virtualization
    Wessel, Sascha
    Stumpf, Frederic
    Herdt, Ilja
    Eckert, Claudia
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 148 - 161
  • [3] Improving mobile device security with operating system-level virtualization
    Wessel, Sascha
    Huber, Manuel
    Stumpf, Frederic
    Eckert, Claudia
    COMPUTERS & SECURITY, 2015, 52 : 207 - 220
  • [4] Virtualization and Security: Examination of A Virtualization Platform Structure
    Arslan, Ibrahim
    Ozbilgin, Izzet Gokhan
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 221 - 226
  • [5] Virtualization Security A Survey
    AbdElRahem, Omnia
    Bahaa-Eldin, Ayman M.
    Taha, Ayman
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2016, : 32 - 40
  • [6] Research on Security Requirement and Improvement Recommendation of Smart Mobile Terminal
    Lv, Zhuo
    Niu, Shuangxia
    Zhang, Zhigang
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1631 - 1634
  • [7] Virtualization Security Assessment
    Hoesing, Michael T.
    INFORMATION SECURITY JOURNAL, 2009, 18 (03): : 124 - 130
  • [8] A Study on Mobile Virtualization
    Roh, Hyun-suk
    Lee, Hyun-woo
    Lee, Sang-ho
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 593 - 596
  • [9] V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service
    Zhu, Hui
    Xue, Yingfang
    Chen, Xiaofeng
    Li, Qiang
    Li, Hui
    MOBILE INFORMATION SYSTEMS, 2015, 2015 : 1 - 9
  • [10] A user study on mobile virtualization to measure personal freedom vs. enterprise security
    Jaramillo, David
    Ackerbauer, Michael
    Woodburn, Stephen
    IEEE SOUTHEASTCON 2014, 2014,