|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn826853884 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
130124s2012 ne o 000 0 eng d |
040 |
|
|
|a MHW
|b eng
|e pn
|c MHW
|d EBLCP
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d MERUC
|d ZCU
|d ICG
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d SGP
|d OCLCO
|d OCL
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781614991571
|
020 |
|
|
|a 161499157X
|
029 |
1 |
|
|a DEBBG
|b BV044171966
|
029 |
1 |
|
|a DEBSZ
|b 405684282
|
029 |
1 |
|
|a DEBSZ
|b 431298092
|
029 |
1 |
|
|a DEBSZ
|b 456516360
|
035 |
|
|
|a (OCoLC)826853884
|
050 |
|
4 |
|a QA76.5915
|
082 |
0 |
4 |
|a 006
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Weber, S. G.
|
245 |
1 |
0 |
|a Multilaterally Secure Pervasive Cooperation.
|
260 |
|
|
|a Amsterdam :
|b IOS Press,
|c 2012.
|
300 |
|
|
|a 1 online resource (196 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ...; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System
|
505 |
8 |
|
|a Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario
|
505 |
8 |
|
|a Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives
|
505 |
8 |
|
|a Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles
|
505 |
8 |
|
|a Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Ubiquitous computing.
|
650 |
|
0 |
|a Electronic digital computers.
|
650 |
|
0 |
|a Computers.
|
650 |
|
6 |
|a Informatique omniprésente.
|
650 |
|
6 |
|a Ordinateurs.
|
650 |
|
7 |
|a computers.
|2 aat
|
650 |
|
7 |
|a Computers
|2 fast
|
650 |
|
7 |
|a Electronic digital computers
|2 fast
|
650 |
|
7 |
|a Ubiquitous computing
|2 fast
|
758 |
|
|
|i has work:
|a Multilaterally secure pervasive cooperation (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGQHpkpg7vwfXFqYdpKDFX
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|z 9781614991564
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1109534
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1109534
|
994 |
|
|
|a 92
|b IZTAP
|