Security for Ubiquitous Computing - Frank Stajano

Security for Ubiquitous Computing

(Autor)

Buch | Hardcover
272 Seiten
2002
John Wiley & Sons Inc (Verlag)
978-0-470-84493-9 (ISBN)
117,65 inkl. MwSt
Ubiquitous computing is about distributed systems with a difference. It is about hundreds and thousands of computers embedded in everyday devices (such as phones, washing machines, TVs, heating sytems, smartcards, etc) communicating with each other over ad--hoc wireless networks.
* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP
* Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions
* Includes a primer on security and the basics of cryptography
* Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat

Frank Stajano is the author of Security for Ubiquitous Computing , published by Wiley.

About the Author.

Forward.

Preface.

Acknowledgements.

Contact Information.

1. Introduction.

Scenario.

Essential terminology.

Problems.

Notation.

2. Ubiquitous computing.

Xerox PARC.

Norman's Invisible Computer.

MIT.

HP's Cooltown.

ORL/AT&T Labs Cambridge.

Security issues.

3. Computer security.

Confidentiality.

Integrity.

Availability.

Authentication.

Security policies.

4. Authentication.

New preconditions.

The Resurrecting Duckling security policy model.

The many ways of being a master.

5. Confidentiality.

Cryptographic primitives for peanut processors.

Personal privacy.

6. Integrity.

Message integrity.

Device integrity.

7. Availability.

Threats to the communications channel.

Threats to the battery energy.

Threats from mobile code.

8. Anonymity.

The Cocaine Auction Protocol.

The anonymity layer.

9. Conclusions.

Appendix A: A Short Primer on Functions.

Appendix B: Existing Network Security Solutions.


Annotated bibliography.

Index.

Erscheint lt. Verlag 15.3.2002
Reihe/Serie Wiley Series in Communications Networking and Distributed Systems
Verlagsort New York
Sprache englisch
Maße 176 x 249 mm
Gewicht 624 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Technik Elektrotechnik / Energietechnik
ISBN-10 0-470-84493-0 / 0470844930
ISBN-13 978-0-470-84493-9 / 9780470844939
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00