Increasing Privacy in Mobile Communication Systems using Cryptographically Protected Objects
Confidential information contained in the transactional data created in mobile communication systems is not very well protected. We present an approach to protect entire objects against manipulation and disclosure, which allows to retain some control over information handed to a different entity or can be used to prevent reverse engineering of an object to obtain its original source. The approach is subsequently used in the context of mobile communication systems to protect the current location of a mobile user against unauthorized access.
Unable to display preview. Download preview PDF.
- R. Anderson and M. Kuhn. Tamper resistance — a cautionary note. In The Second USENIX Workshop on Electronic Commerce Proceedings, pages 1–11, Oakland, California, November 1996.Google Scholar
- G. Brassard.Modern Cryptology - A Tutorial, volume 325 of Lecture Notes in Computer Science. Springer Verlag, 1988.Google Scholar
- H. Damker, H. Federrath, M. Reichenbach, and A. Bertsch. Persönliches Erreichbarke- itsmanagement. In G. Mtiller and A. Pfitzmann, editors, Sicherheit in der Kommunikationstechnik. Addison-Wesley, 1997.Google Scholar
- J. S. Fritzinger and M. Mueller. Java security. White paper, Sun Microsystems, Inc., 1996.Google Scholar
- A. Herzberg and S. S. Pinter. Public protection of software. In Advances in Cryptology: CRYPTO’85, pages 158–179, Santa Barbara, California, August 1985.Google Scholar
- P. Johns. Signing and marking ActiveX controls. Developer Network News, November 1996.Google Scholar
- G. Nilsson, F. Dupuy, and M. Chapman. An overview of the telecommunicatinos information networking architecture. In TINA’95, pages 1–11, Melbourne, Australia, February 1995.Google Scholar
- A. Pfitzmann. Technischer Datenschutz in öffentlichen Funknetzen. Datenschutz und Datensicherung (DuD), 17(8):451–463,1993.Google Scholar
- RSA Data Security, Inc. PKCS #1: RSA Encryption Standard. RSA Data Security, Inc., November 1993.Google Scholar
- B. Schneier. Applied cryptography. Wiley, New York, 1994.Google Scholar
- New York Times. U.S. workers stole data on 11,000, agency says, April 6, 1996.Google Scholar
- I. S. Winkler. The non-technical threat to computing systems. Computing Systems, USENIX Association, 9(1):3–14, Winter 1996.Google Scholar