Abstract
The world is going mobile! The usage of internet services is rapidly moving from PC systems to Tablets and Smartphones. Main drivers for this are user convenience and mobile connectivity. To ensure reliable transactions, user privacy and fraud prevention, secure solutions are the key for the user acceptance and a strong growth in the future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Literature
[CC] Common Criteria http://www.commoncriteriaportal.org/cc/
[COMEC] Action plan on eCommerce „A coherent framework to build trust in the Digital single market for e-commerce and online services“, COM(2011)942 of 11 January 2012
[COMEM] Green Paper “Towards an integrated European market for card, internet and mobile payments”, COM(2011)941 of 11 January 2012
[COMPI] Proposal for a Regulation on the protection of individuals with regard to the processing of personal data and on the free move-ment of such data, COM(2012)11 of 25 January 2012
[COMPR] Communication on “Safeguarding Privacy in a Connected World A European Data Protection Framework for the 21st Century”, COM(2012)9 of 25 January 2012
[EMVCo] EMVCo http://www.emvco.com/default.aspx
[ESDR] Eurosmart Digital Security Reference Paper available on www.eurosmart.com
[FIPS] FIPS 140-2 security requirements http://www.nist.gov/itl/upload/fips1402.pdf
[GP] GlobalPlatform http://www.globalplatform.org/
[GPCC] GlobalPlatform Card Composition Model v1.0 under http://www.globalplatform.org/specificationscard.asp
[GPTEE] GlobalPlatform TEE System Architecture v1.0 http://www.globalplatform.org/sp25x-19g57/g953-ff472.asp
[JMTR] Juniper Malicious Mobile Threats Report 2010/2011
[MTCG] Mobile in Trusted Computing Group http://www.trustedcomputinggroup.org/developers/mobile
[SEEK] Seek for android http://code.google.com/p/seek-for-android/
[SIMA] SIMAlliance http://www.simalliance.org/
[TCG] Trusted Computing Group http://www.trustedcomputinggroup.org/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Borleteau, D., Bousquet, N., Crespo, T., Dubarry, X., Eichholz, J., Galindo, V. (2012). Security of Mobile Devices, Applications and Transactions. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_15
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)