Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Resiliency of mobile OS security for secure personal ubiquitous computing
Lee S., Lee S., Kang T., Kwon M., Lee N., Kim H. Personal and Ubiquitous Computing22 (1):23-34,2018.Type:Article
Date Reviewed: Jun 25 2018

More and more, mobile equipment is a working tool everywhere. The operating system is a fundamental component of the protection strategy, that is, by improving the operating system, we are contributing to more reliable equipment. One of the techniques of the authors’ approach is to strengthen the operating system (OS) kernel for mobile devices: deep mobile OS security (DMOS).

This is a technical, informative paper, where the authors analyze defense techniques and their effects related to resilience. The authors evaluate cyber resilience characteristics during an attack cycle. The paper is well organized, with sections describing the cyber resilience framework, DMOS techniques, an evaluation of these techniques, and a testbed consisting of smartphones and a server for management. The paper would be better if it provided more information on other OS security techniques and how they compare with DMOS.

Reviewer:  Joao Orvalho Review #: CR146109 (1811-0609)
Bookmark and Share
 
Security and Protection (D.4.6 )
 
 
Information Interfaces And Presentation (H.5 )
 
 
Personal Computing (K.8 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy