IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security for Ubiquitous Computing

Security for Ubiquitous Computing
View Sample PDF
Author(s): Tobias Straub (Fraunhofer Institute for Secure Information Technology, Germany)and Andreas Heinemann (Technical University of Darmstadt, Germany)
Copyright: 2009
Pages: 27
Source title: Human Computer Interaction: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Chee Siang Ang (City University of London, UK)and Panayiotis Zaphiris (City University of London, UK)
DOI: 10.4018/978-1-87828-991-9.ch026

Purchase

View Security for Ubiquitous Computing on the publisher's website for pricing and purchasing information.

Abstract

Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.

Related Content

Maja Pucelj, Matjaž Mulej, Anita Hrast. © 2024. 29 pages.
Hemendra Singh. © 2024. 26 pages.
Nestor Soler del Toro. © 2024. 27 pages.
Pablo Banchio. © 2024. 18 pages.
Jože Ruparčič. © 2024. 26 pages.
Anuttama Ghose, Hartej Singh Kochher, S. M. Aamir Ali. © 2024. 28 pages.
Bhupinder Singh, Komal Vig, Pushan Kumar Dutta, Christian Kaunert, Bhupendra Kumar Gautam. © 2024. 23 pages.
Body Bottom