E. Gallery, A. Tomlinson, "Secure Delivery of Conditional Access Applications to Mobile Receivers", in Trusted Computing, C. J. Mitchell (ed.), pp. 195-238, IEE, 2005. Abstract. This chapter describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate to the source of the software that a platform is in a suffciently trustworthy state before any application or associated keys are securely downloaded. The protocols are described at an abstract level before being mapped on to specific trusted platform architectures. The protocols are designed to allow mobile devices to receive broadcast content protected by proprietary conditional access applications. They may also be applied in the general case where demonstration of a secure execution environment is required before an application is downloaded. Note: The University of Auckland library should soon obtain an online copy of this book. In the meantime, a non-archival version of this article can be obtained at http://personal.rhul.ac.uk/umai/274/Publications/SecureDeliveryof2005.pdf. @INCOLLECTION{SecureDeliveryof2005, AUTHOR = {Eimear Gallery and Allan Tomlinson}, TITLE = {{S}ecure {D}elivery of {C}onditional {A}ccess {A}pplications to {M}obile {R}eceivers}, BOOKTITLE = {Trusted Computing}, PUBLISHER = {IEE}, YEAR = {2005}, EDITOR = {Chris J. Mitchell}, NOTE = {(to appear)}, ABSTRACT = {This chapter describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate to the source of the software that a platform is in a suffciently trustworthy state before any application or associated keys are securely downloaded. The protocols are described at an abstract level before being mapped on to specific trusted platform architectures. The protocols are designed to allow mobile devices to receive broadcast content protected by proprietary conditional access applications. They may also be applied in the general case where demonstration of a secure execution environment is required before an application is downloaded.}, KEYWORDS = {trust broadcast}, PDF = {Articles\OwnPublications\SecureDeliveryof2005.pdf} } URL: http://www.iee.org/Publish/Books/CompApp/index.cfm?book=PC%20006