Trusted military services based on the secure domain of the mobile security solution.
GeonLyang KimJaeDeok LimYongSung JeonJeongNyeo KimPublished in: ICTC (2015)
Keyphrases
- trusted computing
- mobile payment
- mobile commerce
- security requirements
- security services
- computing environments
- network connection
- security mechanisms
- security issues
- identity management
- trust relationships
- security patterns
- mobile devices
- mobile agent system
- location aware
- security architecture
- mobile services
- security level
- mobile applications
- previously mentioned
- security analysis
- security measures
- key management
- web services
- service management
- electronic payment
- payment systems
- mobile networks
- mobile environments
- security model
- heterogeneous platforms
- factor authentication
- data encryption
- public key infrastructure
- smart card
- user privacy
- context aware
- access control
- trusted platform module
- network access
- information security
- user authentication
- security protocols
- cloud computing
- security policies
- security properties
- remote attestation
- cryptographic protocols
- electronic transactions
- sensitive data
- wireless networks
- security management
- virtual organization