IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Mobile Public Key Infrastructures

Mobile Public Key Infrastructures
View Sample PDF
Author(s): I. Chochliouros (Hellenic Telecommunications Organization S.A., Greece), G. Lalopoulos (Hellenic Telecommunications Organization S.A., Greece), S. Chochliouros (Independent Consultant, Greece)and A. Spiliopoulou (Hellenic Telecommunications Organization S.A., Greece)
Copyright: 2007
Pages: 8
Source title: Encyclopedia of Mobile Computing and Commerce
Source Author(s)/Editor(s): David Taniar (Monash University, Australia)
DOI: 10.4018/978-1-59904-002-8.ch097

Purchase

View Mobile Public Key Infrastructures on the publisher's website for pricing and purchasing information.

Abstract

From today’s perspective, network and information security (European Commission, 2001) is about ensuring the availability of services and data; preventing the disruption and unauthorized interception of communications; confirming that data sent, received, or stored is complete and unchanged; securing data confidentiality; protecting information systems against unauthorized access; and protecting against attacks (involving malicious software and securing dependable authentication—that is, the confirming of an asserted identity of entities or users). Specific security measures therefore should be taken in order to establish an appropriate environment.

Related Content

Tapan Kumar Behera. © 2023. 20 pages.
B. Narendra Kumar Rao. © 2023. 17 pages.
Blendi Rrustemi, Deti Baholli, Herolind Balaj. © 2023. 18 pages.
Alma Beluli. © 2023. 11 pages.
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku. © 2023. 15 pages.
Yllka Totaj. © 2023. 12 pages.
Hla Myo Tun, Devasis Pradhan. © 2023. 31 pages.
Body Bottom