Cellular Authentication for Mobile and Internet Services (eBook)
212 Seiten
John Wiley & Sons (Verlag)
978-0-470-77100-6 (ISBN)
Architecture (GAA), its infrastructure, usage and
integration into existing networks
Cellular Authentication for Mobile and Internet Services
introduces the reader into the field of secure communication for
mobile applications, including secure web browsing with a phone or
PC, Single Sign-On (SSO), mobile broadcast content protection,
secure location services, etc. The book discusses the Generic
Authentication Architecture (GAA) of the mobile standardization
body 3rd Generation Partnership Project (3GPP) and its
American counterpart 3GPP2 in full detail and with all variants. It
explains the usage of GAA by various standardization bodies and
standardized applications, and also looks at a number of
non-standardized ones, such as secure remote login to enterprise
environment and card personalization.
Cellular Authentication for Mobile and Internet
Services:
* Describes the usage of the generic authentication architecture
(GAA) by various standardization bodies and standardized
applications, covering mobile broadcast / multicast service
security, Single Sign-On, HTTPS (i.e. secure web browsing), secure
data access, secure location services, etc
* Provides guidance on how to integrate the generic
authentication into existing and future terminals, networks and
applications
* Explains the functionality of the application security in
general as well as on application developer level
* Describes various business scenarios and related security
solutions, and covers secure application implementation and
integration
* Brings together essential information (currently scattered
across different standardization bodies) on standards in one
comprehensive volume
This excellent all-in-one reference will provide system and
protocol designers, application developers, senior software project
managers, telecommunication managers and ISP managers with a sound
introduction into the field of secure communication for mobile
applications. System integrators, advanced students, Ph.D.
candidates, and professors of computer science or
telecommunications will also find this text very useful.
Silke Holtmanns, Nokia Research Center, Helsinki, Finland is a Researcher in?the at Nokia Research Center (NRC) Helsinki in the Trustworthy Communications and Identities Team of the Internet Core Technology Center. She joined NRC in 2004 in the?Mobile Computer Human-Interaction Competence Area and the Software and Applications Technology Lab. Prior to joining Nokia, she worked at Ericsson Research Department - Service Networks and Applications Technology. Valtteri Niemi, Nokia Research Center, Helsinki, Finland is a Research Team Leader at NRC and a part-time professor at the University of Turku Philip Ginzboorg, Nokia Research Center, Helsinki, Finland is a Principal Research Engineer at NRC. Pekka Laitinen, Nokia Research Center, Helsinki, Finland is a Security Researcher at NRC. N. Asokan, Helsinki Finland is a part-time Professor at the Helsinki University of Technology.
Preface.
Acknowledgements.
1. Introduction.
1.1. Authenticated Key Agreement.
1..1. The Challenge in Authenticated Key Agreement.
1.3. How to read This Book?
2. Classical Approaches to Authentication and Key
Agreement.
2.1. Existing Mobile Security Solutions.
2.2. General-Purpose Approaches to Authentication and Key
Management.
2.3. Requirements for GAA.
3. Generic Authentication Architecture.
3.1. Overview of Generic Authentication Architecture.
3.2. Foundations of GAA.
3.3. Variations of the Generic Bootstrapping Architecture.
3.4. Building Blocks of GAA.
3.5. Other Architectural Issues.
3.6. Overview of 3GPP GAA Specifications.
4. Applications Using Generic Authentication
Architecture.
4.1. Standardized Usage Scenarios.
4.2. Additional Usage Scenarios.
5. Guidance for Deploying GAA.
5.1. Integration with Application Servers.
5.2. Integration with OS Security.
5.3. Integration with Identity Management Systems.
5.4. Integration of GAA into Mobile Networks.
6. Future Trends.
6.1. Standardization Outlook.
6.2. Outlook for GAA.
Terminology and Abbreviations.
Index.
Erscheint lt. Verlag | 15.9.2008 |
---|---|
Sprache | englisch |
Themenwelt | Technik ► Elektrotechnik / Energietechnik |
Technik ► Nachrichtentechnik | |
Schlagworte | Communication System Security • Communication technology • Computersicherheit • Electrical & Electronics Engineering • Elektrotechnik u. Elektronik • Kommunikationstechnik • Sicherheit in Kommunikationssystemen |
ISBN-10 | 0-470-77100-3 / 0470771003 |
ISBN-13 | 978-0-470-77100-6 / 9780470771006 |
Haben Sie eine Frage zum Produkt? |
Größe: 2,4 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich