Mundus External Co-operation Window Programme
of the European Union.
REFERENCES
Aggarwal, M. and Vennon, T. (2010). Study of BlackBerry
proof-of-concept malicious applications. Technical
Report White paper, SMobile Global Threat Center.
Agreiter, B., Alam, M., Hafner, M., Seifert, J. P., and
Zhang, X. (2007). Model driven configuration of
secure operating systems for mobile applications in
healthcare. In Proceedings of the 1st International
Workshop on Mode-Based Trustworthy Health Infor-
mation Systems.
Alves, T. and Felton, D. (2004). TrustZone: Integrated
hardware and software security. Technical report,
ARM.
Anderson, J. (1972). Computer security technology
planning study. Technical Report ESD-TR-73-51,
AFSC, Hanscom AFB, Bedford, MA. AD-758 206,
ESD/AFSC.
Android Open Source Project (2010). Project website.
http://www.android.com.
Apple Inc. (2010). iOS website. http://www.apple.com/
iphone/ios4.
Azema, J. and Fayad, G. (2008). M-Shield
TM
mo-
bile security technology: making wireless se-
cure. Texas Instruments White Paper. fo-
cus.ti.com/pdfs/wtbu/ti mshield whitepaper.pdf.
Benelli, G. and Pozzebon, A. (2010). Near field communi-
cation and health: Turning a mobile phone into an in-
teractive multipurpose assistant in healthcare scenar-
ios. In Biomedical Engineering Systems and Tech-
nologies, International Joint Conference, BIOSTEC
2009, Revised Selected Papers, volume 52 of Commu-
nications in Computer and Information Science, pages
356–368. Springer.
Brygier, J., Fuchsen, R., and Blasum, H. (2009). PikeOS:
Safe and secure virtualization in a separation micro-
kernel. Technical report, Sysgo.
EMSCB Project Consortium (2005–2008). The Euro-
pean Multilaterally Secure Computing Base (EM-
SCB) project. http://www.emscb.org.
Fraim, L. (1983). SCOMP: A solution to the multilevel
security problem. In IEEE Computer, pages 26–34.
Gajek, S., L
¨
ohr, H., Sadeghi, A.-R., and Winandy, M.
(2009). TruWallet: Trustworthy and migratable
wallet-based web authentication. In The 2009 ACM
Workshop on Scalable Trusted Computing (STC’09),
pages 19–28. ACM.
Google Android (2010). Security and permissions.
http://developer.android.com/intl/de/guide/topics/
security/security.html.
Han, D., Park, S., and Lee, M. (2008). THE-MUSS: Mobile
u-health service system. In Biomedical Engineering
Systems and Technologies, International Joint Confer-
ence, BIOSTEC 2008, Revised Selected Papers, vol-
ume 25 of Communications in Computer and Infor-
mation Science, pages 377–389. Springer.
Hildon Application Framework (2010). Project website.
http://live.gnome.org/Hildon.
Iozzo, V. and Weinmann, R.-P. (2010).
Ralf-Philipp Weinmann & Vincenzo
Iozzo own the iPhone at PWN2OWN.
http://blog.zynamics.com/2010/03/24/ralf-philipp-
weinmann-vincenzo-iozzo-own-the-iphone-at-pwn2
own/.
Karger, P. A., Zurko, M. E., Bonin, D. W., Mason, A. H.,
and Kahn, C. E. (1990). A VMM security kernel
for the VAX architecture. In Proceedings of the
IEEE Symposium on Research in Security and Pri-
vacy, pages 2–19, Oakland, CA. IEEE Computer So-
ciety, Technical Committee on Security and Privacy,
IEEE Computer Society Press.
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock,
D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolan-
ski, R., Norrish, M., Sewell, T., Tuch, H., and Win-
wood, S. (2009). seL4: Formal verification of an OS
kernel. In Proceedings of the 22nd ACM Symposium
on Operating Systems Principles, Big Sky, MT, USA.
ACM Press. To appear.
Kostiainen, K., Dmitrienko, A., Ekberg, J.-E., Sadeghi, A.-
R., and Asokan, N. (2010). Key attestation from
trusted execution environments. In TRUST 2010: Pro-
ceedings of the 3rd International Conference on Trust
and Trustworthy Computing, pages 30–46. Springer.
Kostiainen, K., Ekberg, J.-E., Asokan, N., and Rantala, A.
(2009). On-board credentials with open provisioning.
In ASIACCS ’09: Proceedings of the 4th International
Symposium on Information, Computer, and Commu-
nications Security, pages 104–115. ACM.
Liedtke, J. (1995). On microkernel construction. In Pro-
ceedings of the 15th ACM Symposium on Operating
Systems Principles (SOSP’95), Copper Mountain Re-
sort, Colorado. Appeared as ACM Operating Systems
Review 29.5.
Loscocco, P. and Smalley, S. (2001). Integrating flexible
support for security policies into the Linux operating
system. In Proceedings of the FREENIX Track: 2001
USENIX Annual Technical Conference, pages 29–42.
USENIX Association.
Lua (2010). Project website. http://www.lua.org.
Maemo (2010). Project website. http://maemo.org.
Microsoft (2010). Windows mobile website. http://www.
microsoft.com/windowsmobile.
Open Kernel Labs (2010). OKL4 project website.
http://okl4.org.
Paros (2010). Project website. http://www.parosproxy.org.
Selhorst, M., St
¨
uble, C., Feldmann, F., and Gnaida, U.
(2010). Towards a trusted mobile desktop. In Trust
and Trustworthy Computing (TRUST 2010), volume
6101 of LNCS, pages 78–94. Springer.
A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES
95