Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Secure Mobile Architecture
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Secure_Mobile_Architecture
http://dbpedia.org/ontology/abstract Mobile telephony (cellular) has become a cMobile telephony (cellular) has become a commonplace aspect of modern life. Mobile computing is less well established than mobile telephony, partly because of the lack of a common standard infrastructure for secure seamless mobile computing for the Internet. With the increasing number of mobile workers, a secure mobile architecture specification is needed to allow businesses and individuals to maintain secure connections when moving or mobile. Secure Mobile Architecture (SMA) grew from work in The Open Group's (TOG) Mobile Management Forum (MMF). The MMF developed a demonstration of proprietary seamless secure session management across different networks, which was given at The Open Group Conference in Berlin, April 2001. This led to the development by the MMF together with The Open Group Directory Interoperability Forum (DIF) of the Business Scenario – The Executive on the Move. This business scenario described the requirements for directories to support mobile computing. The Open Group then worked on a Challenge to vendors of directories and related products to provide support for mobile computing. The SMA activity became a task group in The Open Group and the participants developed the Secure Mobile Architecture (SMA) over a three-year period, publishing in February 2004. The architecture described in the SMA Vision and Architecture was developed by a team of Boeing, Lockheed-Martin, Motorola, IBM, Hewlett-Packard, Netmotion Wireless, Wheatstone Consulting and the University of St Thomas. Its central features were the use of the Host Identity Protocol (HIP), cryptographic identities, secure directories, and location to make policy-based information about users and the network available to applications, management systems, and intelligent network components. A directory schema appropriate for this purpose was developed and worked out in detail.se was developed and worked out in detail.
http://dbpedia.org/ontology/wikiPageExternalLink https://web.archive.org/web/20050826194642/http:/www.ietf.org/proceedings/01mar/slides/hip-1/index.htm + , https://www.amazon.com/Host-Identity-Protocol-HIP-Communications/dp/0470997907/ref=sr_1_1%3Fie=UTF8&s=books&qid=1262535050&sr=1-1 + , https://www.amazon.com/Beyond-HIP-End-Hacking-Know/dp/1439256047/ref=sr_1_1%3Fie=UTF8&s=books&qid=1262533140&sr=1-1 + , https://www.amazon.com/Beyond-HIP-Hacking-Know-ebook/dp/B0031U06H8/ref=sr_1_1%3Fie=UTF8&s=digital-text&qid=1262534916&sr=1-1 + , http://www.opengroup.org/bookstore/catalog/e041.htm + , http://www.opengroup.org/bookstore/catalog/k021.htm + , https://www2.opengroup.org/ogsys/catalog/C142 +
http://dbpedia.org/ontology/wikiPageID 10478649
http://dbpedia.org/ontology/wikiPageLength 4030
http://dbpedia.org/ontology/wikiPageRevisionID 840482056
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Category:Mobile_software + , http://dbpedia.org/resource/Mobile_Architecture + , http://dbpedia.org/resource/Host_Identity_Protocol + , http://dbpedia.org/resource/Beyond_HIP:_The_End_to_Hacking_As_We_Know_It + , http://dbpedia.org/resource/Host_Identity_Protocol_%28book%29 +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Context +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Mobile_software +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Secure_Mobile_Architecture?oldid=840482056&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Secure_Mobile_Architecture +
owl:sameAs http://dbpedia.org/resource/Secure_Mobile_Architecture + , http://www.wikidata.org/entity/Q7444850 + , https://global.dbpedia.org/id/4uU9E + , http://rdf.freebase.com/ns/m.02qfbzd +
rdfs:comment Mobile telephony (cellular) has become a cMobile telephony (cellular) has become a commonplace aspect of modern life. Mobile computing is less well established than mobile telephony, partly because of the lack of a common standard infrastructure for secure seamless mobile computing for the Internet. With the increasing number of mobile workers, a secure mobile architecture specification is needed to allow businesses and individuals to maintain secure connections when moving or mobile. secure connections when moving or mobile.
rdfs:label Secure Mobile Architecture
hide properties that link here 
http://dbpedia.org/resource/Secure_Mobile_Architecture_%28SMA%29 + http://dbpedia.org/ontology/wikiPageRedirects
http://dbpedia.org/resource/Secure_Mobile_Architecture_%28SMA%29 + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Secure_Mobile_Architecture + http://xmlns.com/foaf/0.1/primaryTopic
 

 

Enter the name of the page to start semantic browsing from.