Documentos de Académico
Documentos de Profesional
Documentos de Cultura
IN MOBILE COMPUTING
ABSTRACT
INDEX
INTRODUCTION
CONCEPTS
SECURITY
WAP ARCHITECTURE
WAP ENVIRONMENT
CONCLUSION
INTRODUCTION
Provide DNS services, for example to resolve domain names used in URLs.
Act as a proxy, translating the WAP protocol stack to the Internet protocol
stack.
Integrity – being able to ensure that messages received are genuine and have not been
tampered with or otherwise compromised
Authorization – being able to ascertain that a party wanting to perform some action is
entitled to perform that action within the given context
Non-repudiation – being able to ensure that once a party has voluntarily committed to
an action it is not possible.
ENCRYPTION
CERTIFICATES
WTLS
Class 3: Certificate based client and server authentication. Both client and server keys
are anonymous or authenticated.
This method amounts to introducing security at a software layer above WAP, Instead
of using WAP’s protocol for secure transport (WTLS), security is taken care of by
means of dedicated software running at the two “ends”, the mobile phone and the e-
merchant’s web server. Such software could perform encryption in a way that
eliminated the security hole at the gateway.
CONCLUSION
Over-the-air security
Offline security
Firewall Security
WAP user community can be with both peace of mind and confidence that there
privacy, confidentiality, integrity are strictly secure.
Thus the fact that the user community on the wireless telephony
network is growing faster and Future generations of wireless technology will not only
bring the Internet to individuals, they will deliver individuals to the Internet in more
transparent ways. However, mobility is not about the technology and it is not only
about being wireless. But establishing and maintaining effective policies that address
the security, integrity, availability, confidentiality and privacy of critical information
system assets is crucial to business survival. These policies are all part of the broader
information assurance, where trust is key and which is a fundamental part of the
digital economy's four imperatives.