Long-Term & Dynamical Aspects of Information Security
Nova Science Publishers Inc (Verlag)
978-1-60021-912-2 (ISBN)
The first six papers deal with computer security technology that operates in rapidly changing environments and has to adapt to their shifting conditions. The technology or application envisaged in the second six operates or assumes a static outcome that can, for instance, be used forensically. The second half of the book contains a proposal to quantify the time scales on which IT security lives may be a major contribution of this volume. The authors identify three main axes. First, the time scale of practical relevance. It denominates approximately the middle of the time range during which the problem treated by the technology becomes imminent to the IS&T community, through the demands of the market. Second, the technological research and development (R&D) time scale. It is a forecast of when the technological solution will be "there". This means in effect the first of two milestones in technology evolution: a) when a technology has made the breakthrough to be in principle, ie: theoretically and economically applicable and viable, and b) when it is matured to reach prevalence in IS&T, ie: to become textbook standard. The second point in time hinges obviously on external factors not amenable to analysis within the discipline proper. Third, we have the event horizon of the technology in question. That deals with the issue of the sustainability of the solution: May it be surpassed by the skills of attackers using advances in other areas? Can it be foreseen that it will be overcome by even better solutions?
Preface; An Approach for Secure Usability for Ambient Intelligence Environments; Analysis of Privacy Policies for Dynamic Systems; Preserving Privacy in the Web by Using Information Flow Control; Geographically Secure Routing for Mobile Ad Hoc Networks: A Cross-Layer Based Approach; Open Ambient: A Pervasive Access Control Architecture; Evaluation of PC-based Real-Time Watermarking System for Long-Term Video Preservation; Long-term Secure Key Establishment; Applicability of Quantum Cryptography for Securing Mobile Communication Networks; Long-term Security for Signed Documents: Services, Protocols, and Data Structures; Why Digital Signatures Fail- Legal Concepts for Long Term Validity in Austria, Germany and Poland; Providing Evidence with Transformed Signed Documents; Design Strategies for Secure Embedded Networking; Index.
Zusatzinfo | Illustrations |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 260 x 180 mm |
Gewicht | 606 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-60021-912-8 / 1600219128 |
ISBN-13 | 978-1-60021-912-2 / 9781600219122 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich