Advertisement

Finding the Mobile Trusted Element

  • Fabio Ricciato
  • Maura Turolla
  • Antonio Varriale

Abstract

Nowadays a number of services and applications delivered on mobile terminals need to be secured in order to guarantee the user privacy, the business stakeholders and the commercial and legal issues related to security threads.

Nevertheless, mobile terminals available on the market cannot be considered trusted in wide sense, since they do not meet the stringent security paradigms that, for instance, smart card based applications development and deployment require.

Locating key security elements inside mobile terminals becomes a most peculiar issue to deliver new applications which focus on the identification, authentication and protection of users and/or service delivery related to third parties information.

This paper highlights the security issues on mobile terminals, considering primarily Telecom Italia use cases and business experience, emphasizing the importance to identify the mobile trusted elements and stakeholders in the security management within mobile handsets.

Keywords

Smart Card Security Requirement Mobile Terminal Multimedia Content Mobile Operator 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [Kerc83]
    Kerckhoffs, Auguste «La cryptographie militaire, Journal des sciences militaires », vol. IX, pp. 5–83, Jan. 1883, pp. 161-191, Feb. 1883.Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • Fabio Ricciato
    • 1
  • Maura Turolla
    • 1
  • Antonio Varriale
    • 1
  1. 1.Telecom Italia, Access and Mobile TerminalsItaly

Personalised recommendations