2.1 Stakeholder 1: The Users
In our scenario the user has a mobile device which
can execute adaptive applications and receive updates.
The user wants to make the best use of the services
at the least cost. The user also wishes to retain in-
tegrity, confidentiality, availability and privacy of his
data. These constraints result in the following secu-
rity requirements with respect to the other parties.
Software producer
1. The software is written by the intended authors ⇒
Verification of the authors’ authenticity.
2. The software accesses and modifies only authori-
sed resources ⇒ Preservation of confidentiality and
integrity of his data.
3. The software passes only data admitted by the user
⇒ Respect for his decisions on his privacy.
4. The software performs only intended modifications
⇒ Verification of the semantic integrity of data (sa-
fety of the software).
5. The software does not block access to previously
accessible data ⇒ Preservation of availability.
6. The software does not prevent future adaptations ⇒
Preservation of availability of software adaptations.
The first requirement can be satisfied with digital
signatures. Access control mechanisms can be used
to enforce requirement 2, or cryptographic hash func-
tions can be used, at least, to discover a violation of
integrity. Data outside the intended working set can
be encrypted to preserve confidentiality. To satisfy
requirement 3, the user must be able to confirm or ob-
ject to a data transmission. This implies the provision
of a trusted input and display by the hardware and the
operating system. Since the general user cannot verify
the safety of software, a recovery mechanism is indis-
pensable to achieve requirement 4. This also supports
requirements 5 and 6.
Content provider
1. Software is not modified during distribution ⇒ Ve-
rification of software integrity.
2. The process of the software transmission is not re-
vealed for privacy reasons.
The first requirement can be satisfied with digi-
tal signatures. The second requirement implies the
ability to buy content anonymously. On the other
hand, content providers may need to identify a user
to process payment.
Service providers and network operators Here,
the requirements are the same as for the content pro-
viders. If the user’s identification is not needed, en-
cryption of the transmission preserves privacy.
Hardware manufacturers
1. The software does not disable critical hardware
functions ⇒ Maintenance of their availability.
2. The hardware device prevents the execution or ad-
aptation of software at the user’s request.
3. The software transmission process is not revealed
for privacy reasons ⇒ Prevention of identification.
To partially satisfy requirement 1 the manufacturer
can provide a function to reset the mobile device in a
safe state. Requirement 2 cannot be enforced by the
user without the help of the hardware manufacturer.
Requirement 3 calls for a device which can switch
off hardware identification at the user’s request. Ho-
wever, (Rannenberg, 2000) mentions that it may not
solve the problem.
2.2 Stakeholder 2: Software
Producers
The software producer can be author of a complete
program or a part thereof. We assume a traditional
vendor model, in which software is sold as a product.
Content providers, service providers and network
operators
1. The producer’s profit depends on his reputation ⇒
Proof of software integrity and authenticity.
2. To charge for software usage, the producer wants
to prevent unlicensed software distribution.
Again, requirement 1 can be satisfied with digital
signatures along the distribution chain. The second
requirement can be satisfied in this setting in several
ways (the detailed description of which will be given
in a separate paper).
Users and hardware manufacturers
1. Licence compliant usage ⇒ Verification of licen-
ses.
This requirement relies on the verification of the
execution environment, eg, device identification.
2.3 Stakeholder 3: Content
Providers
The content provider’s role resembles that of a mer-
chant in the traditional world. His primary goal, pro-
fit, implies the following security requirements.
Software producers
1. Reputation of selling genuine software ⇒ Verifica-
tion of authenticity and integrity.
Simple solution: digital signatures.
ICETE 2005 - WIRELESS COMMUNICATION SYSTEMS AND NETWORKS
132