JOURNAL ARTICLE

A Mobile service architecture utilising trusted computing

Abstract

Convergence of access technologies potentially enables new mobile business scenarios. To enable them, trust between the stakeholders is a prerequisite, e.g., in the form of a cross-domain authentication infrastructure. Service architectures provide solutions for some of these needs. This paper proposes a use case combining the well understood techniques from the mobile domain with the upcoming new possibilities of trusted computing.

Keywords:
Direct Anonymous Attestation Trusted Network Connect Authentication (law) Trusted Computing Mobile device Mobile computing Service (business) Domain (mathematical analysis)

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.44
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Access Control and Trust
Social Sciences →  Social Sciences →  Sociology and Political Science
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Mobile Agent-Based Network Management
Physical Sciences →  Computer Science →  Computer Networks and Communications
© 2026 ScienceGate Book Chapters — All rights reserved.