IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security for Ubiquitous Computing

Security for Ubiquitous Computing
View Sample PDF
Author(s): Tobias Straub (Fraunhofer Institute for Secure Information Technology, Germany)and Andreas Heinemann (Technical University of Darmstadt, Germany)
Copyright: 2008
Pages: 26
Source title: Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
Source Author(s)/Editor(s): Max Mühlhäuser (Darmstadt University of Technology, Germany)and Iryna Gurevych (Darmstadt University of Technology, Germany)
DOI: 10.4018/978-1-59904-832-1.ch015

Purchase

View Security for Ubiquitous Computing on the publisher's website for pricing and purchasing information.

Abstract

Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.

Related Content

Bin Guo, Yunji Liang, Zhu Wang, Zhiwen Yu, Daqing Zhang, Xingshe Zhou. © 2014. 20 pages.
Yunji Liang, Xingshe Zhou, Bin Guo, Zhiwen Yu. © 2014. 31 pages.
Igor Bisio, Alessandro Delfino, Fabio Lavagetto, Mario Marchese. © 2014. 33 pages.
Kobkaew Opasjumruskit, Jesús Expósito, Birgitta König-Ries, Andreas Nauerz, Martin Welsch. © 2014. 22 pages.
Viktoriya Degeler, Alexander Lazovik. © 2014. 23 pages.
Vlasios Kasapakis, Damianos Gavalas. © 2014. 26 pages.
Zhu Wang, Xingshe Zhou, Daqing Zhang, Bin Guo, Zhiwen Yu. © 2014. 18 pages.
Body Bottom