Multilateral Security in Mobile Applications and Location Based Services

نویسندگان

  • Mario Hoffmann
  • Jan Peters
  • Ulrich Pinsdorf
چکیده

Due to the many current weaknesses of security mechanisms in mobile technology, location based services essentially depend on security aware middleware and reliable multilateral security concepts. Neither the latest operating systems of mobile devices nor current concepts in wireless communication GPRS, WLAN, or Bluetooth meet the security requirements needed to establish sustainable trust between consumers and producers. This paper presents an approach for multilateral secure mobile applications which is based on mobile agent technology. We use mobile agents as highly dynamic deployment mechanisms for service components. Our approach allows us to enforce fine-granular multilateral security policies for all involved participants: service distributors, service providers, and users accessing the service. Our work is applied to the MOBILE project funded by the German Federal Ministry for Education and Research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

Multilateral security considerations for adaptive mobile applications

Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality. But to make this technology a success, the security of all concerned parties must be addressed. This work presents a multilateral security examination in two stages. We first introduce a co-operatio...

متن کامل

Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN's and Mobile Devices

In the last two decades lot of research and development occurs on Location-Based Authentication and Security Services (LBASSs) which allow users to see where their friends are, to search location-tagged content within their local area networks, and to meet others nearby. Previously the data can be accessed from anywhere and any time. Hence lot of unexpected misjudgment were happened due to loca...

متن کامل

Semantic Authorization of Mobile Web Services

With the recent developments in the cellular world, the high-end mobile phones and PDAs are becoming pervasive and are being used in different application domains. Integration of the web services and cellular domains lead to the new application domain, mobile web services. Mobile web service provisioning offers many of its applications in domains like e-commerce, collaborative applications, soc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002