Privacy, Security and Trust Within the Context of Pervasive Computing

Privacy, Security and Trust Within the Context of Pervasive Computing
-0 %
Print on Demand | Lieferzeit: Print on Demand - Lieferbar innerhalb von 3-5 Werktagen I

Unser bisheriger Preis:ORGPRICE: 114,50 €

Jetzt 106,98 €*

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9781441936295
Veröffentl:
2010
Erscheinungsdatum:
06.12.2010
Seiten:
171
Autor:
Philip Robinson
Gewicht:
268 g
Format:
234x156x10 mm
Sprache:
Englisch
Beschreibung:

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.

The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.

Provides a premier venue to bring together distinguished researchers and practitioners working in all foundational and applied research areas of pervasive and ubiquitous computing
The Influence of Context on Privacy, Trust and Security.- Some Research Challenges in Pervasive Computing.- Overview.- Survey on Location Privacy in Pervasive Computing.- Exploring the Relationship Between Context and Privacy.- Privacy, Security and Trust Issues Raised by the Personal Server Concept.- Secure Trust Models and Management in Pervasive Computing.- Overview.- The Role of Identity in Pervasive Computational Trust.- Towards a Next-Generation Trust Management Infrastructure for Open Computing Systems.- Research Directions for Trust and Security in Human-Centric Computing.- Evidence, Authentication, and Identity.- Overview.- User-Centric Identity Management in Open Mobile Environments.- Pre-Authentication Using Infrared.- Architecture and Protocol for Authorized Transient Control.- Social and Technical Approaches to Privacy Protection.- Overview.- Maintaining Privacy in RFID Enabled Environments.- Safeguarding Personal Data Using Trusted Computing in Pervasive Computing.- A Social Approach to Privacy in Location-Enhanced Computing.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.