Security for Ubiquitous Computing
Κύριος συγγραφέας: | |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | Greek |
Έκδοση: |
England
John Wiley & Sons
c2002
|
Σειρά: | Wiley Series in Communications Networking & Distributed Systems / David Hutchison ed.
|
Θέματα: |
Πίνακας περιεχομένων:
- About the author Foreword Preface Acknowledgements Contact information 1.Introduction 1.1.Scenario 1.2.Essential terminology 1.3.Problems 1.4.Notation 2.Ubiquitous computing 2.1.Xerox PARC 2.2.Norman's Invisible Computer 2.3MIT 2.4 HP's Cooltown 2.5 ORL/AT&T Labs Cambridge 2.6 Security issues 3.Computer security 3.1 Confidentiality 3.2 Integrity 3.3 Availability 3.4 Authentication 3.5 Security policies 4.Authentication 4.1 New preconditions 4.2 The Resurrecting Duckling security policy model 4.3 The many ways of being a master 5. Confidentiality 5.1 Cryptographic primitives for peanut processors 5.2 Personal privacy 6. Integrity 6.1 Message integrity 6.2 Device integrity 7. Availability 7.1 Threats to the communications channel 7.2 Threats to the battery energy 7.3 Threats from mobile code 8. Anonymity 8.1 The Cocaine Auction Protocol 8.2 The anonymity layer 9. Conclusions A. A short primer on fuctions B. Existing network security solutions Annotated bibliography Index