<s>
With	O
the	O
increasing	O
number	O
of	O
mobile	O
workers	O
,	O
a	O
secure	B-Application
mobile	I-Application
architecture	I-Application
specification	O
is	O
needed	O
to	O
allow	O
businesses	O
and	O
individuals	O
to	O
maintain	O
secure	O
connections	O
when	O
moving	O
or	O
mobile	O
.	O
</s>
<s>
Secure	B-Application
Mobile	I-Application
Architecture	I-Application
(	O
SMA	O
)	O
grew	O
from	O
work	O
in	O
The	O
Open	O
Group	O
's	O
(	O
TOG	O
)	O
Mobile	O
Management	O
Forum	O
(	O
MMF	O
)	O
.	O
</s>
<s>
The	O
SMA	O
activity	O
became	O
a	O
task	O
group	O
in	O
The	O
Open	O
Group	O
and	O
the	O
participants	O
developed	O
the	O
Secure	B-Application
Mobile	I-Application
Architecture	I-Application
(	O
SMA	O
)	O
over	O
a	O
three-year	O
period	O
,	O
publishing	O
in	O
February	O
2004	O
.	O
</s>
<s>
Its	O
central	O
features	O
were	O
the	O
use	O
of	O
the	O
Host	B-Protocol
Identity	I-Protocol
Protocol	I-Protocol
(	O
HIP	O
)	O
,	O
cryptographic	O
identities	O
,	O
secure	O
directories	O
,	O
and	O
location	O
to	O
make	O
policy-based	O
information	O
about	O
users	O
and	O
the	O
network	O
available	O
to	O
applications	O
,	O
management	O
systems	O
,	O
and	O
intelligent	O
network	O
components	O
.	O
</s>
