Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Authentication, Authorisation, and Access Control in Mobile Systems

Authentication, Authorisation, and Access Control in Mobile Systems
View Sample PDF
Author(s): Josef Noll (University Graduate Center – UniK, Norway) and György Kálmán (University Graduate Center – UniK, Norway)
Copyright: 2008
Pages: 13
Source title: Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch013


View Authentication, Authorisation, and Access Control in Mobile Systems on the publisher's website for pricing and purchasing information.


Converging networks and mobility raise new challenges towards the existing authentication, authorisation, and accounting (AAA) systems. Focus of the research is towards integrated solutions for seamless service access of mobile users. Interworking issues between mobile and wireless networks are the basis for detailed research on handover delay, multi-device roaming, mobile networks, security, ease-of-use, and anonymity of the user. This chapter provides an overview over the state of the art in authentication for mobile systems and suggests extending AAA mechanisms to home and community networks, taking into account security and privacy of the users.

Related Content

Michael Robinson, Kevin Jones. © 2020. 23 pages.
P. Lalitha Surya Kumari. © 2020. 42 pages.
Xichen Zhang, Ali A. Ghorbani. © 2020. 31 pages.
Dharmpal Singh, Ira Nath, Pawan Kumar Singh. © 2020. 28 pages.
Brian Tuan Khieu, Melody Moh. © 2020. 16 pages.
Prabha Selvaraj, Sumathi Doraikannan, Vijay Kumar Burugari. © 2020. 27 pages.
Mohammad Rasool Fatemi, Ali A. Ghorbani. © 2020. 21 pages.
Body Bottom