Transitive trust in mobile scenarios

8Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired cross-domain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Kuntze, N., & Schmidt, A. U. (2006). Transitive trust in mobile scenarios. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3995 LNCS, pp. 73–85). Springer Verlag. https://doi.org/10.1007/11766155_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free