Mobile User Devices and Security Modules: Design for Trustworthiness

Copyright [©] (1997) by IEEE. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distrubuted for profit. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee.

While new technology has simplified many business and personal transactions, it has also opened the door to high-tech crime. In this article, we investigate design options for mobile user devices that are used in legally significant applications. Such applications authorize transactions: mobile phone calls, access to an office or car, electronic payment in stores, retrieval of stored medical data, and access to information on portable computers. Digital signatiures--the electronic equivalent of handwritten signatures--are at the core of most of these applications and are explained briefly in the "Digital Signatures" sidebar. A trustworthy mobile user device should suit its purpose well and have credible quality.

By: Andreas Pfitzmann (Univ. Dresden, Germany), Birgit Pfitzmann (Univ. Hildesheim, Germany), Matthias Schunter (Univ. Hildesheim, Germany) and Michael Waidner

Published in: Computer, volume , (no ), pages 1-8 in 1997

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .