A conceptual architecture of a trusted mobile environment

被引:0
|
作者
Yan, Zheng [1 ]
机构
[1] Nokia Res Ctr, Helsinki, Finland
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Trust is crucial in mobile communications. How to establish a trusted mobile environment is becoming more and more important for mobile device venders, mobile service providers and mobile networking operators. This paper presents a conceptual architecture towards establishing a trusted mobile environment. The contribution of this paper is a) specifying the architecture of a trusted mobile environment; b) by developing the conceptual architecture, explaining key motivations behind the location of every element in the architecture; and c) evaluating the architecture by applying it into a mobile peer-to-peer system.
引用
收藏
页码:75 / 81
页数:7
相关论文
共 50 条
  • [1] An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices
    Jung, Young-Woo
    Kim, Hag-Young
    Kim, Sang-Wook
    [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 540 - 547
  • [2] Conceptual Trusted Incident Reaction Architecture
    Feltus, Christophe
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL NETWORK CONFERENCE (INC 2010), 2010, : 143 - 152
  • [3] Conceptual design of trusted mobile platform
    Chen, Shu-Yi
    Wen, Ying-You
    Zhao, Hong
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2008, 29 (08): : 1096 - 1099
  • [4] A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
    WANG Juan
    LIN Wutao
    LI Haoyu
    DU Bianxia
    MENG Ke
    WANG Jiang
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 379 - 384
  • [5] Trusted and secure clustering in mobile pervasive environment
    Gaur, Madhu Sharma
    Pant, Bhaskar
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
  • [6] A trusted group signature architecture in virtual computing environment
    Zou, Deqing
    Li, Yunfa
    Wu, Song
    Qiang, Weizhong
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 73 - 85
  • [7] Trusted Architecture for Mobile P2P Systems
    Wu, Xu
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [8] A Trusted Mobile Phone Reference Architecture via Secure Kernel
    Zhang, Xinwen
    Aciicmez, Onur
    Seifert, Jean-Pierre
    [J]. STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 7 - 14
  • [9] DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing
    Du, Ruizhong
    Gao, Yan
    [J]. 52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022), 2022, : 182 - 185
  • [10] The architecture of mobile virtual environment
    Lv, Peng
    Bai, Yuebin
    Ma, Jihong
    Ju, Yanwen
    Qian, Depei
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 555 - +