Security for Ubiquitous Computing

Specificaties
Gebonden, 268 blz. | Engels
John Wiley & Sons | e druk, 2002
ISBN13: 9780470844939
Rubricering
John Wiley & Sons e druk, 2002 9780470844939
€ 135,18
Levertijd ongeveer 8 werkdagen

Samenvatting

∗ Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad–hoc wireless networks

∗ Focuses on two very hot topics: ad–hoc wireless networking and security

∗ Covers security issues for well–established and widely used technologies such as GSM, Bluetooth, and IP

∗ Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in–depth discussion of some specific, cutting–edge solutions

∗ Includes a primer on security and the basics of cryptography

∗ Describes the security issues in "peer–to–peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat

Specificaties

ISBN13:9780470844939
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:268

Inhoudsopgave

About the Author.
<br />
<br /> Forward.
<br />
<br /> Preface.
<br />
<br /> Acknowledgements.
<br />
<br /> Contact Information.
<br />
<br /> 1. Introduction.
<br />
<br /> Scenario.
<br />
<br /> Essential terminology.
<br />
<br /> Problems.
<br />
<br /> Notation.
<br />
<br /> 2. Ubiquitous computing.
<br />
<br /> Xerox PARC.
<br />
<br /> Norman′s Invisible Computer.
<br />
<br /> MIT.
<br />
<br /> HP′s Cooltown.
<br />
<br /> ORL/AT&amp;T Labs Cambridge.
<br />
<br /> Security issues.
<br />
<br /> 3. Computer security.
<br />
<br /> Confidentiality.
<br />
<br /> Integrity.
<br />
<br /> Availability.
<br />
<br /> Authentication.
<br />
<br /> Security policies.
<br />
<br /> 4. Authentication.
<br />
<br /> New preconditions.
<br />
<br /> The Resurrecting Duckling security policy model.
<br />
<br /> The many ways of being a master.
<br />
<br /> 5. Confidentiality.
<br />
<br /> Cryptographic primitives for peanut processors.
<br />
<br /> Personal privacy.
<br />
<br /> 6. Integrity.
<br />
<br /> Message integrity.
<br />
<br /> Device integrity.
<br />
<br /> 7. Availability.
<br />
<br /> Threats to the communications channel.
<br />
<br /> Threats to the battery energy.
<br />
<br /> Threats from mobile code.
<br />
<br /> 8. Anonymity.
<br />
<br /> The Cocaine Auction Protocol.
<br />
<br /> The anonymity layer.
<br />
<br /> 9. Conclusions.
<br />
<br /> Appendix A: A Short Primer on Functions.
<br />
<br /> Appendix B: Existing Network Security Solutions.
<br />
<br />
<br /> Annotated bibliography.
<br />
<br /> Index.
€ 135,18
Levertijd ongeveer 8 werkdagen

Rubrieken

    Personen

      Trefwoorden

        Security for Ubiquitous Computing