{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:58Z","timestamp":1750307038508,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T00:00:00Z","timestamp":1358380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,17]]},"DOI":"10.1145\/2448556.2448573","type":"proceedings-article","created":{"date-parts":[[2013,3,19]],"date-time":"2013-03-19T13:34:53Z","timestamp":1363700093000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards a high-level trusted computing API for Android software stack"],"prefix":"10.1145","author":[{"given":"Abu Talib","family":"Othman","sequence":"first","affiliation":[{"name":"Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"}]},{"given":"Sohail","family":"Khan","sequence":"additional","affiliation":[{"name":"Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"}]},{"given":"Mohammad","family":"Nauman","sequence":"additional","affiliation":[{"name":"Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"}]},{"given":"Shahrulniza","family":"Musa","sequence":"additional","affiliation":[{"name":"Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2013,1,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android -- An Open Handset Alliance Project. http:\/\/code.google.com\/android\/.  Android -- An Open Handset Alliance Project. http:\/\/code.google.com\/android\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Android Reference: Application Fundamentals-Components. Available at: http:\/\/developer.android.com\/guide\/components\/fundamentals.html.  Android Reference: Application Fundamentals-Components. Available at: http:\/\/developer.android.com\/guide\/components\/fundamentals.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Android Reference: Intent. Available at: http:\/\/developer.android.com\/reference\/android\/content\/Intent.html.  Android Reference: Intent. Available at: http:\/\/developer.android.com\/reference\/android\/content\/Intent.html."},{"key":"e_1_3_2_1_4_1","unstructured":"TCG Specification Architecture Overview v1.2 page 11--12. Technical report Trusted Computing Group April 2004.  TCG Specification Architecture Overview v1.2 page 11--12. Technical report Trusted Computing Group April 2004."},{"volume-title":"IDC","year":"2011","key":"e_1_3_2_1_5_1"},{"volume-title":"Canalys","year":"2012","author":"Alto P.","key":"e_1_3_2_1_6_1"},{"volume-title":"Inc.","year":"2009","author":"Clark W.","key":"e_1_3_2_1_7_1"},{"volume-title":"McAfee Labs.","year":"2011","author":"Dirro T.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"volume-title":"Proceedings of the 20th USENIX Security Symposium","year":"2011","author":"Felt A. P.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"A. Gostev. Mobile malware evolution: An overview. Kaspersky Lab's Report on Mobile Viruses 2006.  A. Gostev. Mobile malware evolution: An overview. Kaspersky Lab's Report on Mobile Viruses 2006."},{"key":"e_1_3_2_1_12_1","unstructured":"Trusted Computing Group. Trusted computing group protection profile pc client specific trusted platform module tpm family 1.2. 1.1 2008.  Trusted Computing Group. Trusted computing group protection profile pc client specific trusted platform module tpm family 1.2. 1.1 2008."},{"key":"e_1_3_2_1_13_1","unstructured":"Trusted Computing Group TSS Working Group et al. Tcg software stack (tss) specification version 1.2. 6 March 2009.  Trusted Computing Group TSS Working Group et al. Tcg software stack (tss) specification version 1.2. 6 March 2009."},{"volume-title":"Inc.","year":"2012","author":"Gupta A.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"Java Community Process. JSR321: Trusted Computing API for Java. http:\/\/jcp.org\/en\/jsr\/detail?id=321.  Java Community Process. JSR321: Trusted Computing API for Java. http:\/\/jcp.org\/en\/jsr\/detail?id=321."},{"key":"e_1_3_2_1_16_1","unstructured":"Java Cryptography Extension: Comprehensive API for Cryptographic Services. http:\/\/docs.oracle.com\/javase\/6\/docs\/technotes\/guides\/security\/crypto\/CryptoSpec.html.  Java Cryptography Extension: Comprehensive API for Cryptographic Services. http:\/\/docs.oracle.com\/javase\/6\/docs\/technotes\/guides\/security\/crypto\/CryptoSpec.html."},{"key":"e_1_3_2_1_17_1","unstructured":"M. Pirker R. Toegl T. Winkler T. Vejda etal Trusted computing for the java#8482; platform 2009. Available at: http:\/\/trustedjava.sourceforge.net\/{Accessed on: 15 September 2012}.  M. Pirker R. Toegl T. Winkler T. Vejda et al. Trusted computing for the java#8482; platform 2009. Available at: http:\/\/trustedjava.sourceforge.net\/{Accessed on: 15 September 2012}."},{"volume-title":"IDC","year":"2011","author":"Prete C. D.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"L. Sarmenta J. Rhodes and T. M\u00fcller. Tpm\/j java-based api for the trusted platform module. 2007. Available at: http:\/\/projects.csail.mit.edu\/tc\/tpmj\/{Accessed on: 15 September 2012}.  L. Sarmenta J. Rhodes and T. M\u00fcller. Tpm\/j java-based api for the trusted platform module. 2007. Available at: http:\/\/projects.csail.mit.edu\/tc\/tpmj\/{Accessed on: 15 September 2012}."},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium","year":"2011","author":"Schlegel R.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"M. Selhorst C. Stueble and F. Teerkorn. Tss study-introduction and analysis of the open source tcg software stack trousers and tools in its environment. Study on behalf of the German Federal Office for Information Security (BSI) 2008.  M. Selhorst C. Stueble and F. Teerkorn. Tss study-introduction and analysis of the open source tcg software stack trousers and tools in its environment. Study on behalf of the German Federal Office for Information Security (BSI) 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"e_1_3_2_1_23_1","unstructured":"TCG. The tcg mobile phone work group mobile trusted module specification. TCG specification version 1.0 revision 7.02 1 April 2010.  TCG. The tcg mobile phone work group mobile trusted module specification. TCG specification version 1.0 revision 7.02 1 April 2010."},{"key":"e_1_3_2_1_24_1","unstructured":"E. Tews and M. Hermanowski. Tpm4java a java-based library for the trusted computing 2009. Available at: http:\/\/tpm4java.sourceforge.net\/{Accessed on: 15 September 2012}.  E. Tews and M. Hermanowski. Tpm4java a java-based library for the trusted computing 2009. Available at: http:\/\/tpm4java.sourceforge.net\/{Accessed on: 15 September 2012}."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1095"}],"event":{"name":"ICUIMC '13: The 7th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Kota Kinabalu Malaysia","acronym":"ICUIMC '13"},"container-title":["Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2448556.2448573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2448556.2448573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:20:51Z","timestamp":1750238451000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2448556.2448573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,17]]},"references-count":25,"alternative-id":["10.1145\/2448556.2448573","10.1145\/2448556"],"URL":"https:\/\/doi.org\/10.1145\/2448556.2448573","relation":{},"subject":[],"published":{"date-parts":[[2013,1,17]]},"assertion":[{"value":"2013-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}