Transitive trust in mobile scenarios

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Pre-refereed version. To appear in Proceedings of the International Conference on Emerging Trends in Information and Communica

Scientific paper

Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired crossdomain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Transitive trust in mobile scenarios does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Transitive trust in mobile scenarios, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transitive trust in mobile scenarios will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-69407

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.