IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Methodology for UICC-Based Security Services in Pervasive Fixed Mobile Convergence Systems

A Methodology for UICC-Based Security Services in Pervasive Fixed Mobile Convergence Systems
View Sample PDF
Author(s): Jaemin Park (Convergence WIBRO BU, KT (Korea Telecom), Republic of Korea)
Copyright: 2012
Pages: 22
Source title: Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools
Source Author(s)/Editor(s): Xiaodong Liu (Edinburgh Napier University, UK)and Yang Li (British Telecom, UK)
DOI: 10.4018/978-1-60960-735-7.ch008

Purchase

View A Methodology for UICC-Based Security Services in Pervasive Fixed Mobile Convergence Systems on the publisher's website for pricing and purchasing information.

Abstract

This chapter presents the fundamental and security characteristics of UICC and current practices of UICC-based security services (e.g. banking, stock, network authentication, etc.) in pervasive FMC systems. Moreover, we propose a novel UICC-based service security framework (USF), which implements the essential security functionalities used for FMC services, to provide the integrated security infrastructure and secure FMC services. The USF can be utilized to authenticate users, preserve privacy, and protect network infrastructures and business models of telephony companies.

Related Content

Babita Srivastava. © 2024. 21 pages.
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur. © 2024. 27 pages.
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju. © 2024. 24 pages.
Neeta Baporikar. © 2024. 23 pages.
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman. © 2024. 35 pages.
Charu Banga, Farhan Ujager. © 2024. 24 pages.
Munir Ahmad. © 2024. 27 pages.
Body Bottom