Cargando…

Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Weber, Stefan G.
Autor Corporativo: IOS Press
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Washington, D.C. : IOS Press, ©2012.
Colección:Cryptology and information security series ; v. 9.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn824133749
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 130114s2012 ne ob 000 0 eng d
010 |a  2012951489 
040 |a IOSPR  |b eng  |e pn  |c IOSPR  |d N$T  |d E7B  |d YDXCP  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d LOA  |d COCUF  |d AGLDB  |d MOR  |d PIFAG  |d OCLCQ  |d JBG  |d U3W  |d OCLCF  |d STF  |d WRM  |d VTS  |d NRAMU  |d INT  |d VT2  |d OCLCQ  |d WYU  |d TKN  |d OCLCQ  |d M8D  |d HS0  |d OCLCQ  |d OCLCO  |d OCLCQ  |d QGK  |d OCLCO 
019 |a 961659782  |a 962655015  |a 1055392803  |a 1065913298  |a 1081207647  |a 1228549057  |a 1259217642  |a 1281712742  |a 1286906422 
020 |a 9781614991571  |q (electronic bk.) 
020 |a 161499157X  |q (electronic bk.) 
020 |a 1614991561 
020 |a 9781614991564 
020 |z 9781614991564 
020 |a 1283920301 
020 |a 9781283920308 
029 1 |a AU@  |b 000050608233 
029 1 |a DEBBG  |b BV043121484 
029 1 |a DEBSZ  |b 421279761 
029 1 |a NZ1  |b 15344656 
035 |a (OCoLC)824133749  |z (OCoLC)961659782  |z (OCoLC)962655015  |z (OCoLC)1055392803  |z (OCoLC)1065913298  |z (OCoLC)1081207647  |z (OCoLC)1228549057  |z (OCoLC)1259217642  |z (OCoLC)1281712742  |z (OCoLC)1286906422 
037 |a 9781614991571  |b IOS Press  |n http://www.iospress.nl 
050 4 |a QA76.5915  |b .W43 2012 
072 7 |a COM  |x COM014000  |2 bisacsh 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004  |2 23 
049 |a UAMI 
100 1 |a Weber, Stefan G. 
245 1 0 |a Multilaterally secure pervasive cooperation :  |b privacy protection, accountability and secure communication for the age of pervasive computing /  |c Stefan G. Weber. 
260 |a Amsterdam ;  |a Washington, D.C. :  |b IOS Press,  |c ©2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Cryptology and information security series ;  |v v. 9 
504 |a Includes bibliographical references. 
588 0 |a Title page of PDF; (IOS Press; viewed on Jan. 14, 2013). 
505 0 |a Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ... ; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System 
505 8 |a Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario 
505 8 |a Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives 
505 8 |a Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles 
505 8 |a Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Ubiquitous computing  |x Security measures. 
650 0 |a Data encryption (Computer science) 
650 6 |a Informatique omniprésente  |x Sécurité  |x Mesures. 
650 6 |a Chiffrement (Informatique) 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Data encryption (Computer science)  |2 fast 
710 2 |a IOS Press. 
776 0 8 |i Print version:  |a Weber, Stefan G.  |t Multilaterally secure pervasive cooperation.  |d Amsterdam ; Washington, D.C. : IOS Press, ©2012  |w (DLC) 2012951489 
830 0 |a Cryptology and information security series ;  |v v. 9. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529563  |z Texto completo 
938 |a ebrary  |b EBRY  |n ebr10641750 
938 |a EBSCOhost  |b EBSC  |n 529563 
938 |a YBP Library Services  |b YANK  |n 9961235 
994 |a 92  |b IZTAP