Abstract
Security and privacy issues on mobile device are the hottest issues in both research and industrial area. The prime issue in this topic is lack of trust model and links among social needs, technical requirements, realizing techniques, and technology standards. Constructing links among them is needed to build trust for mobile computing environment. Fig. 1 shows the relationship among these factors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ISO/IEC 27001: Information technology Security techniques Information security management systems - Requirements (2005)
ISO/IEC 15408-1: Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model (2009)
ISO/IEC JTC1 SC27/WG2, http://www.iso.org/iso/iso_technical_committee?commid=45306
Trusted Computing Group, http://www.trustedcomputinggroup.org/
Internet Engineering Task Force, Security Area, http://trac.tools.ietf.org/area/sec/trac/wiki
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Matsuo, S. (2012). Panel Discussion: Mobile Device Trust — How Do We Link Social Needs, Technical Requirements, Techniques and Standards?. In: Mitchell, C.J., Tomlinson, A. (eds) Trusted Systems. INTRUST 2012. Lecture Notes in Computer Science, vol 7711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35371-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-35371-0_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35370-3
Online ISBN: 978-3-642-35371-0
eBook Packages: Computer ScienceComputer Science (R0)