Skip to main content

Finding the Mobile Trusted Element

  • Chapter
  • 508 Accesses

Abstract

Nowadays a number of services and applications delivered on mobile terminals need to be secured in order to guarantee the user privacy, the business stakeholders and the commercial and legal issues related to security threads.

Nevertheless, mobile terminals available on the market cannot be considered trusted in wide sense, since they do not meet the stringent security paradigms that, for instance, smart card based applications development and deployment require.

Locating key security elements inside mobile terminals becomes a most peculiar issue to deliver new applications which focus on the identification, authentication and protection of users and/or service delivery related to third parties information.

This paper highlights the security issues on mobile terminals, considering primarily Telecom Italia use cases and business experience, emphasizing the importance to identify the mobile trusted elements and stakeholders in the security management within mobile handsets.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kerckhoffs, Auguste «La cryptographie militaire, Journal des sciences militaires », vol. IX, pp. 5–83, Jan. 1883, pp. 161-191, Feb. 1883.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Ricciato, F., Turolla, M., Varriale, A. (2006). Finding the Mobile Trusted Element. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9195-2_32

  • Publisher Name: Vieweg

  • Print ISBN: 978-3-8348-0213-2

  • Online ISBN: 978-3-8348-9195-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics