Design and Implementation of Trusted Computing-Based Mutual Authentication Model for Mobile Terminal

Author(s):  
Ricardo Neisse ◽  
Alexander Pretschner ◽  
Valentina Di Giacomo

Usage control policies specify restrictions on the handling of data after access has been granted. The authors present the design and implementation of a framework for enforcing usage control requirements and demonstrate its genericity by instantiating it to two different levels of abstraction, those of the operating system and an enterprise service bus. This framework consists of a policy language, an automatic conversion of policies into enforcement mechanisms, and technology implemented on the grounds of trusted computing technology that makes it possible to detect tampering with the infrastructure. The authors show how this framework can, among other things, be used to enforce separation-of-duty policies. The authors provide a performance analysis.


2014 ◽  
Vol 989-994 ◽  
pp. 5605-5608
Author(s):  
Zhi Hao Zhao ◽  
Ya Bing Chen

In this paper, according to the actual students management work in the school, and link to the student attendance work, we propose one design of the B/S structure system of student attendance management based on the Java EE framework. The system realizes performances such as request and approval leave online, students' attendance data summarize, and others which reduce the workload of student management and improve the working efficiency. With the rapid development of mobile network on campus, this system also has carried on the development of mobile terminal, to further expand the scope of application of the system with the desktop of the student management system transplantation.


Author(s):  
Jean-Franois Frigon ◽  
Ahmed M. Eltawil ◽  
Eugene Grayver ◽  
Alireza Tarighat ◽  
Hanli Zou

Sign in / Sign up

Export Citation Format

Share Document