This document discusses end-to-end security in mobile cloud computing. It defines mobile cloud computing and explains its advantages over mobile devices alone. The document outlines challenges to end-to-end security in service-oriented architectures and mobile cloud computing. It proposes a security framework that uses taint analysis and aspect-oriented programming to monitor service executions and detect unauthorized external service invocations. A trust broker would maintain trust sessions and evaluate the trustworthiness of services to ensure end-to-end security.