2012 16th International Conference on Intelligence in Next Generation Networks 2012
DOI: 10.1109/icin.2012.6376034
|View full text |Cite
|
Sign up to set email alerts
|

Evolution of SIM provisioning towards a flexible MCIM provisioning in M2M vertical industries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Thus, any detail and published secure profile provisioning directly related to eUICC cannot be found, but only few works which describes the enhanced business process for a flexible MCIM (M2M Communication Identity Module) [7] and several works related to the provisioning for UICCs or smart cards can be found [6], [8]- [13]. In [7], the business process related to M2M is mainly focused, therefore no detail consideration of security can be found.…”
Section: B Standardization and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, any detail and published secure profile provisioning directly related to eUICC cannot be found, but only few works which describes the enhanced business process for a flexible MCIM (M2M Communication Identity Module) [7] and several works related to the provisioning for UICCs or smart cards can be found [6], [8]- [13]. In [7], the business process related to M2M is mainly focused, therefore no detail consideration of security can be found.…”
Section: B Standardization and Related Workmentioning
confidence: 99%
“…Thus, any detail and published secure profile provisioning directly related to eUICC cannot be found, but only few works which describes the enhanced business process for a flexible MCIM (M2M Communication Identity Module) [7] and several works related to the provisioning for UICCs or smart cards can be found [6], [8]- [13]. In [7], the business process related to M2M is mainly focused, therefore no detail consideration of security can be found. In [6], the methodology to utilize current UICC technology to provision UICC-based applications after issuing of UICCs is proposed where GP Secure Channel Protocol (hereafter SCP) is applied to the payment applications for post-distribution provisioning and personalization with the utilization of public key-based key agreement between Bank and UICC.…”
Section: B Standardization and Related Workmentioning
confidence: 99%
“…This can be due to the uncertainties related to the value networks of eSIM-based RSM provisioning and MNOs' concerns about potential negative business impacts of eSIM (EY, 2015). Surprisingly, although a potentially significant impact of eSIM on the mobile ecosystem has been recognized (Dhall and Jha, 2018;Meukel et al, 2016), it seems that only one academic study, namely, Bender and Lehmann (2012), has investigated the business aspects of eSIM. The authors presented business processes for eSIM-based RSM.…”
Section: New Radio Technologies and Embedded Simmentioning
confidence: 99%