Abstract
Authentication, Authorization, and Accounting (AAA) technologies arewidely considered to be the key to the growth of e-commerce. Mobilenetwork operators may be one of the first to offer such services thanksto a number of advantages. They will face some issues, however, if theyattempt to launch AAA services for e-commerce. This paper introducessome of the issues including ID mappings, certificate validation, security awareness, andenvironments. Some of the solutions for these issues are also discussed.
Similar content being viewed by others
References
NTT DoCoMo, “Increase of Subscriber Number of i-mode”, http://www.nttdocomo.com/i/i_m_scr.html
VeriSign Inc., http://www.verisign.com/
Baltimore Technologies, http://www.baltimore.com/
IETF AAA-WG, “Authentication, Authorization and Accounting (aaa)”, http://www.ietf.org/html.charters/aaa-charter.html
The Mobile Management Forum, “Authentication, Authorization and Accounting in the Wireless Space”, http://www.opengroup.org/mobile/w901/index.htm
CISCO, “AAA Overview”, http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/ secur_c/scprt1/scaaa.htm
R. Shirey, “Internet Security Glossary”, IETF RFC2828, May 2000.
Entrust, Entrust internet security glossary: http://www.entrust.com/security101/faqs.htm
R. Housley, W. Ford, W. Polk and D. Solo, “Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, IETF RFC2459, January 1999.
M. Myers, R. Ankney, A. Malpani, S. Galperin and C. Adams, “X.509 Internet Public Key Infrastructure Online Certificate Status Protocol – OCSP”, IETF RFC 2560, June 1999.
Mobile electronic Transactions, “MeT Core Specification”, Version 1.0, pp. 9–11, 21 February 2001.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Kawada, E. Authentication Services in Mobile Networks. Wireless Personal Communications 22, 237–243 (2002). https://doi.org/10.1023/A:1019972607764
Issue Date:
DOI: https://doi.org/10.1023/A:1019972607764