Security for Ubiquitous Computing (Wiley Series in Communications Networking & Distributed Systems)

個数:

Security for Ubiquitous Computing (Wiley Series in Communications Networking & Distributed Systems)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 247 p.
  • 言語 ENG
  • 商品コード 9780470844939
  • DDC分類 005.8

Full Description

* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP
* Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions
* Includes a primer on security and the basics of cryptography
* Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat

Contents

About the Author.

Forward.

Preface.

Acknowledgements.

Contact Information.

1. Introduction.

Scenario.

Essential terminology.

Problems.

Notation.

2. Ubiquitous computing.

Xerox PARC.

Norman's Invisible Computer.

MIT.

HP's Cooltown.

ORL/AT&T Labs Cambridge.

Security issues.

3. Computer security.

Confidentiality.

Integrity.

Availability.

Authentication.

Security policies.

4. Authentication.

New preconditions.

The Resurrecting Duckling security policy model.

The many ways of being a master.

5. Confidentiality.

Cryptographic primitives for peanut processors.

Personal privacy.

6. Integrity.

Message integrity.

Device integrity.

7. Availability.

Threats to the communications channel.

Threats to the battery energy.

Threats from mobile code.

8. Anonymity.

The Cocaine Auction Protocol.

The anonymity layer.

9. Conclusions.

Appendix A: A Short Primer on Functions.

Appendix B: Existing Network Security Solutions.


Annotated bibliography.

Index.