The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Mobile Public Key Infrastructures
|
Author(s): I. Chochliouros (Hellenic Telecommunications Organization S.A., Greece), G. Lalopoulos (Hellenic Telecommunications Organization S.A., Greece), S. Chochliouros (Independent Consultant, Greece)and A. Spiliopoulou (Hellenic Telecommunications Organization S.A., Greece)
Copyright: 2007
Pages: 8
Source title:
Encyclopedia of Mobile Computing and Commerce
Source Author(s)/Editor(s): David Taniar (Monash University, Australia)
DOI: 10.4018/978-1-59904-002-8.ch097
Purchase
|
Abstract
From today’s perspective, network and information security (European Commission, 2001) is about ensuring the availability of services and data; preventing the disruption and unauthorized interception of communications; confirming that data sent, received, or stored is complete and unchanged; securing data confidentiality; protecting information systems against unauthorized access; and protecting against attacks (involving malicious software and securing dependable authentication—that is, the confirming of an asserted identity of entities or users). Specific security measures therefore should be taken in order to establish an appropriate environment.
Related Content
Tapan Kumar Behera.
© 2023.
20 pages.
|
B. Narendra Kumar Rao.
© 2023.
17 pages.
|
Blendi Rrustemi, Deti Baholli, Herolind Balaj.
© 2023.
18 pages.
|
Alma Beluli.
© 2023.
11 pages.
|
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku.
© 2023.
15 pages.
|
Yllka Totaj.
© 2023.
12 pages.
|
Hla Myo Tun, Devasis Pradhan.
© 2023.
31 pages.
|
|
|