Advertisement

Increasing Privacy in Mobile Communication Systems using Cryptographically Protected Objects

  • Uwe G. Wilhelm
Chapter
Part of the DUD-Fachbeiträge book series (DUD)

Abstract

Confidential information contained in the transactional data created in mobile communication systems is not very well protected. We present an approach to protect entire objects against manipulation and disclosure, which allows to retain some control over information handed to a different entity or can be used to prevent reverse engineering of an object to obtain its original source. The approach is subsequently used in the context of mobile communication systems to protect the current location of a mobile user against unauthorized access.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    R. Anderson and M. Kuhn. Tamper resistance — a cautionary note. In The Second USENIX Workshop on Electronic Commerce Proceedings, pages 1–11, Oakland, California, November 1996.Google Scholar
  2. [2]
    G. Brassard.Modern Cryptology - A Tutorial, volume 325 of Lecture Notes in Computer Science. Springer Verlag, 1988.Google Scholar
  3. [3]
    D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, February 1981.CrossRefGoogle Scholar
  4. [4]
    H. Damker, H. Federrath, M. Reichenbach, and A. Bertsch. Persönliches Erreichbarke- itsmanagement. In G. Mtiller and A. Pfitzmann, editors, Sicherheit in der Kommunikationstechnik. Addison-Wesley, 1997.Google Scholar
  5. [5]
    J. S. Fritzinger and M. Mueller. Java security. White paper, Sun Microsystems, Inc., 1996.Google Scholar
  6. [6]
    A. Herzberg and S. S. Pinter. Public protection of software. In Advances in Cryptology: CRYPTO’85, pages 158–179, Santa Barbara, California, August 1985.Google Scholar
  7. [7]
    P. Johns. Signing and marking ActiveX controls. Developer Network News, November 1996.Google Scholar
  8. [8]
    G. Nilsson, F. Dupuy, and M. Chapman. An overview of the telecommunicatinos information networking architecture. In TINA’95, pages 1–11, Melbourne, Australia, February 1995.Google Scholar
  9. [9]
    A. Pfitzmann. Technischer Datenschutz in öffentlichen Funknetzen. Datenschutz und Datensicherung (DuD), 17(8):451–463,1993.Google Scholar
  10. [10]
    RSA Data Security, Inc. PKCS #1: RSA Encryption Standard. RSA Data Security, Inc., November 1993.Google Scholar
  11. [11]
    B. Schneier. Applied cryptography. Wiley, New York, 1994.Google Scholar
  12. [12]
    New York Times. U.S. workers stole data on 11,000, agency says, April 6, 1996.Google Scholar
  13. TINA Consortium. Service Architecture, Version 4–0, October 1996. http://www.tinac.com/96/sa96_public.ps. Google Scholar
  14. [14]
    I. S. Winkler. The non-technical threat to computing systems. Computing Systems, USENIX Association, 9(1):3–14, Winter 1996.Google Scholar
  15. [15]
    P. R. Zimmermann. PGPfone Owner’s Manual. Pretty Good Privacy, Inc., July 1996. http://www.pgp.com/products/fone-docs/fone_01.cgi.Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden 1997

Authors and Affiliations

  • Uwe G. Wilhelm
    • 1
  1. 1.Laboratoire de Systèmes d’ExploitationEcole Polytechnique Fédérale de LausanneLausanneSwitzerland

Personalised recommendations