06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY<br />

Institute of Technology, March 2001. Online Available: http://pubs.media.mit.edu/<br />

pubs/papers/01.03.pappuphd.powf.pdf<br />

[61] G. Suh, C. O'Donnell, and S. Devadas, Aegis: A Single-Chip Secure Processor,<br />

Design Test of Computers, vol. 24, no. 6, pp. 570 580, December 2007.<br />

[62] P. Wilson, A. Frey, T. Mihm, D. Kershaw, and T. Alves, Implementing Embedded<br />

<strong>Security</strong> on Dual-Virtual-CPU Systems, IEEE Design and Test of Computers,<br />

vol. 24, pp. 582591, 2007.<br />

[63] K. Kostiainen, J.-E. Ekberg, N. Asokan, and A. Rantala, On-board credentials with<br />

open provisioning, in Proceedings of the 4th International Symposium on In<strong>for</strong>mation,<br />

Computer, and Communications <strong>Security</strong>, ser. ASIACCS '09. New York, NY,<br />

USA: ACM, 2009, pp. 104115.<br />

[64] J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino,<br />

A. J. Feldman, J. Appelbaum, and E. W. Felten, Lest we remember: cold<br />

boot attacks on encryption keys, in Proceedings of the 17th conference on <strong>Security</strong><br />

symposium. Berkeley, CA, USA: USENIX Association, 2008, pp. 4560.<br />

[65] GlobalPlat<strong>for</strong>m Device: GPD/STIP Specication Overview, GlobalPlat<strong>for</strong>m,<br />

Specication Version 2.3, August 2007.<br />

[66] F. C. Bormann, L. Manteau, A. Linke, J. C. Pailles, and J. D. van, Concept<br />

<strong>for</strong> Trusted Personal <strong>Devices</strong> in a Mobile and Networked Environment, in 15th<br />

IST Mobile & Wireless Communications Summit, June 2006. Online Available:<br />

http://doc.utwente.nl/59784/1/Bormann06concept.pdf<br />

[67] S. Drimer, S. J. Murdoch, and R. Anderson, Thinking Inside the Box: System-Level<br />

Failures of <strong>Tamper</strong> Proong, in IEEE Symposium on <strong>Security</strong> and Privacy. USA:<br />

IEEE CS, 2008, pp. 281295.<br />

[68] R. N. Akram, K. Markantonakis, and K. Mayes, Location Based Application Availability,<br />

in On the Move to Meaningful Internet Systems: OTM 2009 Workshops,<br />

R. M. P. Herrero and T. Dillon, Eds., vol. 5872/2009. Vilamoura, Portugal: Springer,<br />

November 2009, pp. 128 138.<br />

[69] Common Criteria <strong>for</strong> In<strong>for</strong>mation Technology <strong>Security</strong> Evaluation, Part 1:<br />

Introduction and General <strong>Model</strong>, Part 2: <strong>Security</strong> Functional Requirements, Part 3:<br />

<strong>Security</strong> Assurance Requirements,, Common Criteria Std. Version 3.1, August 2006.<br />

Online Available: http://www.commoncriteriaportal.org/thecc.html<br />

[70] S. Chaumette and D. Sauveron, New <strong>Security</strong> Problems Raised by Open Multiapplication<br />

Smart Cards. LaBRI, Université Bordeaux 1., pp. 133204, 2004.<br />

[71] B. Parkinson and J. J. Spiker, Global Positioning System: Theory and Applications.<br />

AIAA, January 1996, vol. 1.<br />

[72] (Visited June, 2010) London Underground: Oyster Card. London Underground.<br />

United Kingdom. Online Available: https://oyster.t.gov.uk/oyster/entry.do<br />

[73] (Visited December, 2010) Octopus. Octopus Holdings Ltd. Hong Kong, China.<br />

Online Available: http://www.octopus.com.hk/home/en/index.html<br />

[74] The GlobalPlat<strong>for</strong>m Proposition <strong>for</strong> NFC Mobile: Secure Element Management<br />

455

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!