Parameter based identification, authentication and authorization method for mobile services

This thesis investigates the security and trust issues in mobile services environment and develops solutions based on federated and parameter based identification, authentication and authorization mechanisms. The mobile services are provided by online service providers and identification, authentica...

Full description

Saved in:
Bibliographic Details
Main Author: Dasun Weerasinghe, P W. H
Format: Dissertation
Language:English
Published: ProQuest Dissertations & Theses 01-01-2010
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This thesis investigates the security and trust issues in mobile services environment and develops solutions based on federated and parameter based identification, authentication and authorization mechanisms. The mobile services are provided by online service providers and identification, authentication, authorization and service access are the main stages of the security framework for service provisioning at the mobile device. The novel user login methods for services is an open research issue since the adoption of generic types of user login methods has reduced the security and usability of the mobile services. Trust negotiation and trust destruction between the mobile users and service providers are required if the authentication credentials are not shared between the two parties for the service provision. The use of the federated identity provider as the trust negotiator in the mobile service environment is an open research area. The security protection for data in mobile devices is equality important as security on data transmission in communication channels. The use of public key or long term secret key in mobile devices is a common research solution for data security in mobile devices. However, the use of short-term symmetric cryptographic key in mobile devices will have advantages compared to the use of other cryptographic key technologies.