Multilaterally Secure Pervasive Cooperation.

Saved in:
Bibliographic Details
Main Author: Weber, S. G.
Format: eBook
Language:English
Published: Amsterdam : IOS Press, 2012.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000Mu 4500
001 ocn826853884
003 OCoLC
005 20240623213015.0
006 m o d
007 cr |n|---|||||
008 130124s2012 ne o 000 0 eng d
040 |a MHW  |b eng  |e pn  |c MHW  |d EBLCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d MERUC  |d ZCU  |d ICG  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d SGP  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781614991571 
020 |a 161499157X 
035 |a (OCoLC)826853884 
050 4 |a QA76.5915 
049 |a HCDD 
100 1 |a Weber, S. G. 
245 1 0 |a Multilaterally Secure Pervasive Cooperation. 
260 |a Amsterdam :  |b IOS Press,  |c 2012. 
300 |a 1 online resource (196 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ...; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System 
505 8 |a Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario 
505 8 |a Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives 
505 8 |a Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles 
505 8 |a Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking 
650 0 |a Ubiquitous computing. 
650 0 |a Electronic digital computers. 
650 0 |a Computers. 
650 7 |a computers.  |2 aat 
650 7 |a Computers  |2 fast 
650 7 |a Electronic digital computers  |2 fast 
650 7 |a Ubiquitous computing  |2 fast 
758 |i has work:  |a Multilaterally secure pervasive cooperation (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGQHpkpg7vwfXFqYdpKDFX  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9781614991564 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=1109534  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD