Vai al contenuto principale della pagina
| Titolo: |
Security in Pervasive Computing [[electronic resource] ] : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings / / edited by Dieter Hutter, Markus Ullmann
|
| Pubblicazione: | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
| Edizione: | 1st ed. 2005. |
| Descrizione fisica: | 1 online resource (XI, 239 p.) |
| Disciplina: | 005.8 |
| Soggetto topico: | Computer communication systems |
| Software engineering | |
| Operating systems (Computers) | |
| Computers and civilization | |
| Management information systems | |
| Computer science | |
| User interfaces (Computer systems) | |
| Computer Communication Networks | |
| Software Engineering | |
| Operating Systems | |
| Computers and Society | |
| Management of Computing and Information Systems | |
| User Interfaces and Human Computer Interaction | |
| Persona (resp. second.): | HutterDieter |
| UllmannMarkus | |
| Note generali: | Bibliographic Level Mode of Issuance: Monograph |
| Nota di bibliografia: | Includes bibliographical references and index. |
| Nota di contenuto: | Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who’s Talking – Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices. |
| Titolo autorizzato: | Security in Pervasive Computing ![]() |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 996465812703316 |
| Lo trovi qui: | Univ. di Salerno |
| Opac: | Controlla la disponibilità qui |