Security requirement for mobile virtualization

被引:0
|
作者
Lee, Hyunjung [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Informat Secur Grp, Suwon, Gyeonggi Do, South Korea
来源
关键词
mobile virtualization; mobile; security; CC; hypervisor;
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Once smartphones began entering the marketplace in 2007, it was only a matter of time before programs like Bring Your Own Device (BYOD) and the subsequent Corporate-Owned, Personally Enabled (COPE) began to arise. For mobile security, many company developed the various security product for mobile device (MDM, MAM, Mobile antivirus, mobile virtualization etc). Mobile virtualization among various security products offers an extensible feature set that supports enterprise business needs for mobile security and management and Personal needs for mobile usability. This paper analyzes the mobile environment and intends to derive security functional requirements for a Mobile Virtualization based on the Common Criteria V3.1.
引用
收藏
页码:217 / 228
页数:12
相关论文
共 50 条
  • [31] A Survey of Security Issues in Hardware Virtualization
    Pek, Gabor
    Buttyan, Levente
    Bencsath, Boldizsar
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [32] A Uniquified Virtualization Approach to Hardware Security
    Stitt, Greg
    Karam, Robert
    Yang, Kai
    Bhunia, Swarup
    IEEE EMBEDDED SYSTEMS LETTERS, 2017, 9 (03) : 53 - 56
  • [33] Application Security through Sandbox Virtualization
    Vokorokos, Liberios
    Balaz, Anton
    Mados, Branislav
    ACTA POLYTECHNICA HUNGARICA, 2015, 12 (01) : 83 - 101
  • [34] Virtualization: Issues, Security Threats, and Solutions
    Pearce, Michael
    Zeadally, Sherali
    Hunt, Ray
    ACM COMPUTING SURVEYS, 2013, 45 (02)
  • [35] Applying Virtualization Technology in Security Education
    Xu, Wenjuan
    Madison, Kevin
    Flinn, Michael
    Kwok, Willson
    4TH WORLD CONFERENCE ON LEARNING TEACHING AND EDUCATIONAL LEADERSHIP (WCLTA-2013), 2014, 141 : 10 - 14
  • [36] A Survey on Security in Network Functions Virtualization
    Yang, Wei
    Fung, Carol
    2016 IEEE NETSOFT CONFERENCE AND WORKSHOPS (NETSOFT), 2016, : 15 - 19
  • [37] Ensuring Security for Virtualization in Cloud Services
    Kumar, Udaya N. L.
    Siddappa, M.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2016, : 248 - 251
  • [38] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [39] Virtualization and security - Back to the future - Introduction
    King, Samuel T.
    Smith, Sean W.
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 15 - 15
  • [40] VIRTUS: A new processor virtualization architecture for security-oriented next-generation mobile terminals
    Inoue, Hiroaki
    Ikeno, Akihisa
    Kondo, Masaki
    Sakai, Junji
    Edahiro, Masato
    43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006, 2006, : 484 - +