Abstract
Nowadays a number of services and applications delivered on mobile terminals need to be secured in order to guarantee the user privacy, the business stakeholders and the commercial and legal issues related to security threads.
Nevertheless, mobile terminals available on the market cannot be considered trusted in wide sense, since they do not meet the stringent security paradigms that, for instance, smart card based applications development and deployment require.
Locating key security elements inside mobile terminals becomes a most peculiar issue to deliver new applications which focus on the identification, authentication and protection of users and/or service delivery related to third parties information.
This paper highlights the security issues on mobile terminals, considering primarily Telecom Italia use cases and business experience, emphasizing the importance to identify the mobile trusted elements and stakeholders in the security management within mobile handsets.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kerckhoffs, Auguste «La cryptographie militaire, Journal des sciences militaires », vol. IX, pp. 5–83, Jan. 1883, pp. 161-191, Feb. 1883.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Ricciato, F., Turolla, M., Varriale, A. (2006). Finding the Mobile Trusted Element. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_32
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9195-2_32
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0213-2
Online ISBN: 978-3-8348-9195-2
eBook Packages: Computer ScienceComputer Science (R0)