Finding the Mobile Trusted Element
Nowadays a number of services and applications delivered on mobile terminals need to be secured in order to guarantee the user privacy, the business stakeholders and the commercial and legal issues related to security threads.
Nevertheless, mobile terminals available on the market cannot be considered trusted in wide sense, since they do not meet the stringent security paradigms that, for instance, smart card based applications development and deployment require.
Locating key security elements inside mobile terminals becomes a most peculiar issue to deliver new applications which focus on the identification, authentication and protection of users and/or service delivery related to third parties information.
This paper highlights the security issues on mobile terminals, considering primarily Telecom Italia use cases and business experience, emphasizing the importance to identify the mobile trusted elements and stakeholders in the security management within mobile handsets.
KeywordsSmart Card Security Requirement Mobile Terminal Multimedia Content Mobile Operator
Unable to display preview. Download preview PDF.
- [Kerc83]Kerckhoffs, Auguste «La cryptographie militaire, Journal des sciences militaires », vol. IX, pp. 5–83, Jan. 1883, pp. 161-191, Feb. 1883.Google Scholar