{"id":"https://openalex.org/W2786978339","doi":"https://doi.org/10.1109/pimrc.2017.8292646","title":"On the use of TEE for mission critical public safety use cases","display_name":"On the use of TEE for mission critical public safety use cases","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2786978339","doi":"https://doi.org/10.1109/pimrc.2017.8292646","mag":"2786978339"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc.2017.8292646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101604175","display_name":"Ali Raza","orcid":"https://orcid.org/0000-0003-4096-8377"},"institutions":[{"id":"https://openalex.org/I109703491","display_name":"Rochester Institute of Technology - Dubai","ror":"https://ror.org/03zmfa837","country_code":"AE","type":"education","lineage":["https://openalex.org/I109703491"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Ali Raza","raw_affiliation_strings":["Dept. Networks and Security, Rochester Institute of Technology, Dubai, UAE"],"affiliations":[{"raw_affiliation_string":"Dept. Networks and Security, Rochester Institute of Technology, Dubai, UAE","institution_ids":["https://openalex.org/I109703491"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101604175"],"corresponding_institution_ids":["https://openalex.org/I109703491"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27497988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7159122228622437},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.6890884637832642},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.683605968952179},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6113268733024597},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5825183987617493},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.48570379614830017},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4814988374710083},{"id":"https://openalex.org/keywords/subscriber-identity-module","display_name":"Subscriber identity module","score":0.425433874130249},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39938926696777344},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3840353488922119},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2956712245941162},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09525924921035767}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7159122228622437},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.6890884637832642},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.683605968952179},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6113268733024597},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5825183987617493},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.48570379614830017},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4814988374710083},{"id":"https://openalex.org/C40367706","wikidata":"https://www.wikidata.org/wiki/Q230110","display_name":"Subscriber identity module","level":3,"score":0.425433874130249},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39938926696777344},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3840353488922119},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2956712245941162},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09525924921035767},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C2779971919","wikidata":"https://www.wikidata.org/wiki/Q1378949","display_name":"Handset","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc.2017.8292646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1967449502","https://openalex.org/W2137390791","https://openalex.org/W2161186258","https://openalex.org/W2186405047","https://openalex.org/W2921286899","https://openalex.org/W6760169343"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W2566006169","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W2941957272","https://openalex.org/W2948256481","https://openalex.org/W2151211278"],"abstract_inverted_index":{"Standards":[0],"developed":[1,168],"for":[2,32,42,110,118,169],"Mission":[3],"Critical":[4],"Services":[5,81],"(MCS)":[6],"to":[7,54,59,102,184,192],"serve":[8],"Public":[9],"Safety":[10],"(PS)":[11],"over":[12,120,195],"Long-Term":[13],"Evolution":[14],"(LTE)":[15],"in":[16,132,173],"3GPP":[17],"Release":[18],"12":[19],"and":[20,39,61,106],"13":[21],"define":[22],"the":[23,76,129,133,136,150,153,174,185],"security":[24,52,126,145],"requirements":[25],"which":[26],"are":[27,65],"founded":[28],"on":[29,75],"principles":[30],"used":[31],"Commercial":[33],"LTE":[34,123],"networks.":[35,48],"Deployment":[36],"models,":[37],"applications":[38],"use":[40,56,77,112,151],"cases":[41,57],"PS":[43,111,119],"vary":[44],"significantly":[45],"from":[46],"commercial":[47,68,122,137],"Hence,":[49],"more":[50],"sophisticated":[51],"mechanisms":[53],"facilitate":[55],"related":[58],"provisioning":[60],"service":[62],"activation":[63],"that":[64],"beyond":[66],"regular":[67],"use.":[69],"Existing":[70],"user":[71,100],"authentication":[72],"is":[73,131,164,177],"based":[74,161],"of":[78,135,152],"a":[79,87,91,103,121,159,170,197],"Universal":[80,93],"Identity":[82],"Module":[83],"(USIM)":[84],"application":[85],"running":[86],"secure":[88,162],"element":[89,163],"within":[90],"single":[92],"Integrated":[94],"Circuit":[95],"Card":[96],"(UICC)":[97],"card.":[98],"Single":[99],"binding":[101],"SIM":[104],"card":[105],"device":[107],"becomes":[108],"restrictive":[109],"cases.":[113],"Furthermore,":[114],"MCS":[115],"being":[116],"offered":[117],"network":[124,138],"entails":[125],"vulnerabilities":[127],"as":[128,158],"USIM":[130],"domain":[134],"provider,":[139],"thereby":[140],"not":[141],"satisfying":[142],"minimum":[143],"PSN":[144],"requirements.":[146],"In":[147],"this":[148],"paper":[149],"Trusted":[154],"Execution":[155],"Environment":[156],"(TEE)":[157],"hardware":[160],"evaluated.":[165],"A":[166],"solution":[167],"Government":[171],"entity":[172],"Middle":[175],"East":[176],"presented":[178],"whereby":[179],"any":[180],"COTS":[181],"smartphone":[182],"connected":[183],"internet,":[186],"supporting":[187],"TEE":[188],"functionality":[189],"with":[190],"attestation":[191],"be":[193],"taken":[194],"by":[196],"public":[198],"safety":[199],"officer":[200],"securely.":[201]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
