06-03-2012, 11:37 PM
Secure Service-Oriented Architecture for Mobile Transactions full report and ppt..
06-03-2012, 11:37 PM
Secure Service-Oriented Architecture for Mobile Transactions full report and ppt..
21-06-2012, 01:44 PM
Secure Service-Oriented Architecture for Mobile Transactions
Secure Service-Oriented Architecture for Mobile Transactions.doc (Size: 507 KB / Downloads: 47) Abstract The paper describes secure service-oriented architecture for mobile transactions. The architecture comprises components, protocols, applications and interfaces and it provides various security services to various mobile applications: Registration, Certification, Authentication, and Authorization of users, secure messaging at an application–level (end–to–end security), protection of data in databases, and security services for protection of its own components. The architecture is modular, integrated, extendible and scalable. The paper describes design of the architecture, the status of its current implementation, and future research and development plans. Existing System: In Existing system there are several systems in some countries supporting mobile financial transactions. But, all current systems are just “point-solutions”. They are based on proprietary products and therefore not compliant to any standard. As such, current mobile transaction systems are not mutually compatible, they cannot scale, and they are not easily extendable with additional functions or services. All current implementations provide very limited scope of functions and generally have no security features. Security of these systems relies on features provided by the GSM network, which are not adequate, especially for financial environments or on use of simple PIN schemes. Security components and services In this module provide the full scope of security services to users, transactions, applications and data stored in the database. These security servers are: Strong Authentication (SA) Server, and Authorization Server. They provide security services to mobile transactions. There are four groups of those security services: registration and identity management services, certification and certificates management services, smart cards management services, and authorization services. Authorization Service In this module service communicate with each other to perform mobile transactions. However, each person must be able to authenticate and access authorized resources. To achieve authentication between communicating entitles, a Strong Authentication is performed. |
|
Possibly Related Threads… | |||||
Thread | Author | Replies | Views | Last Post | |
polytronics seminar | Guest | 4 | 19,120 |
28-09-2018, 07:46 PM Last Post: [email protected] |
|
pvc coating seminar report | Guest | 1 | 4,058 |
22-09-2017, 11:00 AM Last Post: jaseela123 |
|
li fi seminar | Guest | 1 | 1,294 |
21-09-2017, 03:16 PM Last Post: jaseela123 |
|
google wave protocol seminar report | Guest | 1 | 8,173 |
21-09-2017, 12:39 PM Last Post: jaseela123 |
|
seminar artificial leaf | Guest | 1 | 2,343 |
19-09-2017, 04:09 PM Last Post: jaseela123 |
|
ieee seminar topics for information technology | Guest | 1 | 7,262 |
18-09-2017, 04:17 PM Last Post: jaseela123 |
|
seminar report on hydrogen super highway | bishwas | 1 | 2,844 |
15-09-2017, 03:15 PM Last Post: jaseela123 |
|
4g mobile communication system ppt download free | Guest | 1 | 6,032 |
14-09-2017, 12:37 PM Last Post: jaseela123 |
|
seminar paper for personal area network | Guest | 1 | 2,210 |
13-09-2017, 10:16 AM Last Post: jaseela123 |
|
seminar topics for computer science 2013 | Guest | 1 | 2,782 |
09-09-2017, 01:51 PM Last Post: jaseela123 |