Multilaterally secure pervasive cooperation :: privacy protection, accountability and secure communication for the age of pervasive computing /
The mechanisms which support secure communication, privacy protection and accountability are crucial parts of most computing systems. Pervasive computing is characterized by the large-scale collection, distribution and aggregation of information related to individuals and their activities. From the...
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington, D.C. :
IOS Press,
©2012.
|
Schriftenreihe: | Cryptology and information security series ;
v. 9. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The mechanisms which support secure communication, privacy protection and accountability are crucial parts of most computing systems. Pervasive computing is characterized by the large-scale collection, distribution and aggregation of information related to individuals and their activities. From the outset, the inherent privacy and IT security issues of pervasive computing have been an area of critical focus, and associated unforeseeable consequences for the individual have been mentioned. This book addresses these issues, and seeks to demonstrate that carefully devised protection mechanisms can become enablers for multilaterally acceptable and trustworthy digital interactions and ICT-based cooperations. It explores new facets of privacy protection and accountability for digitally recorded real-world actions as well as novel forms of communication in a descriptive manner.A thorough investigation of main pervasive computing concepts is presented, together with a motivation and elicitation of security requirements within the emergency response application domain; also the state-of-the-art of existing security mechanisms is discussed. The areas covered include: digital pseudonyms and auditing mechanisms, efficient encryption techniques and concepts for end-to-end secure messaging, as well as pervasive computing approaches to first response.The book will be of interest to anybody involved in the design, realization and use of secure and privacy-preserving pervasive computing systems and applications. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781614991571 161499157X 1614991561 9781614991564 1283920301 9781283920308 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn824133749 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 130114s2012 ne ob 000 0 eng d | ||
010 | |a 2012951489 | ||
040 | |a IOSPR |b eng |e pn |c IOSPR |d N$T |d E7B |d YDXCP |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AZK |d LOA |d COCUF |d AGLDB |d MOR |d PIFAG |d OCLCQ |d JBG |d U3W |d OCLCF |d STF |d WRM |d VTS |d NRAMU |d INT |d VT2 |d OCLCQ |d WYU |d TKN |d OCLCQ |d M8D |d HS0 |d OCLCQ |d OCLCO |d OCLCQ |d QGK |d OCLCO |d OCLCL |d SFB | ||
019 | |a 961659782 |a 962655015 |a 1055392803 |a 1065913298 |a 1081207647 |a 1228549057 |a 1259217642 |a 1281712742 |a 1286906422 | ||
020 | |a 9781614991571 |q (electronic bk.) | ||
020 | |a 161499157X |q (electronic bk.) | ||
020 | |a 1614991561 | ||
020 | |a 9781614991564 | ||
020 | |z 9781614991564 | ||
020 | |a 1283920301 | ||
020 | |a 9781283920308 | ||
035 | |a (OCoLC)824133749 |z (OCoLC)961659782 |z (OCoLC)962655015 |z (OCoLC)1055392803 |z (OCoLC)1065913298 |z (OCoLC)1081207647 |z (OCoLC)1228549057 |z (OCoLC)1259217642 |z (OCoLC)1281712742 |z (OCoLC)1286906422 | ||
037 | |a 9781614991571 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a QA76.5915 |b .W43 2012 | |
072 | 7 | |a COM |x COM014000 |2 bisacsh | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Weber, Stefan G. | |
245 | 1 | 0 | |a Multilaterally secure pervasive cooperation : |b privacy protection, accountability and secure communication for the age of pervasive computing / |c Stefan G. Weber. |
260 | |a Amsterdam ; |a Washington, D.C. : |b IOS Press, |c ©2012. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cryptology and information security series ; |v v. 9 | |
504 | |a Includes bibliographical references. | ||
588 | 0 | |a Title page of PDF; (IOS Press; viewed on Jan. 14, 2013). | |
505 | 0 | |a Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ... ; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System | |
505 | 8 | |a Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario | |
505 | 8 | |a Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives | |
505 | 8 | |a Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles | |
505 | 8 | |a Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking | |
546 | |a English. | ||
520 | |a The mechanisms which support secure communication, privacy protection and accountability are crucial parts of most computing systems. Pervasive computing is characterized by the large-scale collection, distribution and aggregation of information related to individuals and their activities. From the outset, the inherent privacy and IT security issues of pervasive computing have been an area of critical focus, and associated unforeseeable consequences for the individual have been mentioned. This book addresses these issues, and seeks to demonstrate that carefully devised protection mechanisms can become enablers for multilaterally acceptable and trustworthy digital interactions and ICT-based cooperations. It explores new facets of privacy protection and accountability for digitally recorded real-world actions as well as novel forms of communication in a descriptive manner.A thorough investigation of main pervasive computing concepts is presented, together with a motivation and elicitation of security requirements within the emergency response application domain; also the state-of-the-art of existing security mechanisms is discussed. The areas covered include: digital pseudonyms and auditing mechanisms, efficient encryption techniques and concepts for end-to-end secure messaging, as well as pervasive computing approaches to first response.The book will be of interest to anybody involved in the design, realization and use of secure and privacy-preserving pervasive computing systems and applications. | ||
650 | 0 | |a Ubiquitous computing |x Security measures. | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 6 | |a Informatique omniprésente |x Sécurité |x Mesures. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
710 | 2 | |a IOS Press. |0 http://id.loc.gov/authorities/names/no2015091156 | |
758 | |i has work: |a Multilaterally secure pervasive cooperation (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFGYyYyVfGGwjjXx968cT3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Weber, Stefan G. |t Multilaterally secure pervasive cooperation. |d Amsterdam ; Washington, D.C. : IOS Press, ©2012 |w (DLC) 2012951489 |
830 | 0 | |a Cryptology and information security series ; |v v. 9. |0 http://id.loc.gov/authorities/names/no2008086431 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529563 |3 Volltext |
938 | |a ebrary |b EBRY |n ebr10641750 | ||
938 | |a EBSCOhost |b EBSC |n 529563 | ||
938 | |a YBP Library Services |b YANK |n 9961235 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn824133749 |
---|---|
_version_ | 1816882219620237313 |
adam_text | |
any_adam_object | |
author | Weber, Stefan G. |
author_corporate | IOS Press |
author_corporate_role | |
author_facet | Weber, Stefan G. IOS Press |
author_role | |
author_sort | Weber, Stefan G. |
author_variant | s g w sg sgw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.5915 .W43 2012 |
callnumber-search | QA76.5915 .W43 2012 |
callnumber-sort | QA 276.5915 W43 42012 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ... ; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking |
ctrlnum | (OCoLC)824133749 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08154cam a2200829 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn824133749</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">130114s2012 ne ob 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2012951489</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">HS0</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SFB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">961659782</subfield><subfield code="a">962655015</subfield><subfield code="a">1055392803</subfield><subfield code="a">1065913298</subfield><subfield code="a">1081207647</subfield><subfield code="a">1228549057</subfield><subfield code="a">1259217642</subfield><subfield code="a">1281712742</subfield><subfield code="a">1286906422</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614991571</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">161499157X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614991561</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614991564</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614991564</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283920301</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283920308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)824133749</subfield><subfield code="z">(OCoLC)961659782</subfield><subfield code="z">(OCoLC)962655015</subfield><subfield code="z">(OCoLC)1055392803</subfield><subfield code="z">(OCoLC)1065913298</subfield><subfield code="z">(OCoLC)1081207647</subfield><subfield code="z">(OCoLC)1228549057</subfield><subfield code="z">(OCoLC)1259217642</subfield><subfield code="z">(OCoLC)1281712742</subfield><subfield code="z">(OCoLC)1286906422</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781614991571</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.5915</subfield><subfield code="b">.W43 2012</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Weber, Stefan G.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Multilaterally secure pervasive cooperation :</subfield><subfield code="b">privacy protection, accountability and secure communication for the age of pervasive computing /</subfield><subfield code="c">Stefan G. Weber.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington, D.C. :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 9</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Title page of PDF; (IOS Press; viewed on Jan. 14, 2013).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ... ; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The mechanisms which support secure communication, privacy protection and accountability are crucial parts of most computing systems. Pervasive computing is characterized by the large-scale collection, distribution and aggregation of information related to individuals and their activities. From the outset, the inherent privacy and IT security issues of pervasive computing have been an area of critical focus, and associated unforeseeable consequences for the individual have been mentioned. This book addresses these issues, and seeks to demonstrate that carefully devised protection mechanisms can become enablers for multilaterally acceptable and trustworthy digital interactions and ICT-based cooperations. It explores new facets of privacy protection and accountability for digitally recorded real-world actions as well as novel forms of communication in a descriptive manner.A thorough investigation of main pervasive computing concepts is presented, together with a motivation and elicitation of security requirements within the emergency response application domain; also the state-of-the-art of existing security mechanisms is discussed. The areas covered include: digital pseudonyms and auditing mechanisms, efficient encryption techniques and concepts for end-to-end secure messaging, as well as pervasive computing approaches to first response.The book will be of interest to anybody involved in the design, realization and use of secure and privacy-preserving pervasive computing systems and applications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Ubiquitous computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Informatique omniprésente</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091156</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Multilaterally secure pervasive cooperation (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFGYyYyVfGGwjjXx968cT3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Weber, Stefan G.</subfield><subfield code="t">Multilaterally secure pervasive cooperation.</subfield><subfield code="d">Amsterdam ; Washington, D.C. : IOS Press, ©2012</subfield><subfield code="w">(DLC) 2012951489</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 9.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008086431</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529563</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10641750</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">529563</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">9961235</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn824133749 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:08Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2015091156 |
isbn | 9781614991571 161499157X 1614991561 9781614991564 1283920301 9781283920308 |
language | English |
lccn | 2012951489 |
oclc_num | 824133749 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IOS Press, |
record_format | marc |
series | Cryptology and information security series ; |
series2 | Cryptology and information security series ; |
spelling | Weber, Stefan G. Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing / Stefan G. Weber. Amsterdam ; Washington, D.C. : IOS Press, ©2012. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Cryptology and information security series ; v. 9 Includes bibliographical references. Title page of PDF; (IOS Press; viewed on Jan. 14, 2013). Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ... ; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking English. The mechanisms which support secure communication, privacy protection and accountability are crucial parts of most computing systems. Pervasive computing is characterized by the large-scale collection, distribution and aggregation of information related to individuals and their activities. From the outset, the inherent privacy and IT security issues of pervasive computing have been an area of critical focus, and associated unforeseeable consequences for the individual have been mentioned. This book addresses these issues, and seeks to demonstrate that carefully devised protection mechanisms can become enablers for multilaterally acceptable and trustworthy digital interactions and ICT-based cooperations. It explores new facets of privacy protection and accountability for digitally recorded real-world actions as well as novel forms of communication in a descriptive manner.A thorough investigation of main pervasive computing concepts is presented, together with a motivation and elicitation of security requirements within the emergency response application domain; also the state-of-the-art of existing security mechanisms is discussed. The areas covered include: digital pseudonyms and auditing mechanisms, efficient encryption techniques and concepts for end-to-end secure messaging, as well as pervasive computing approaches to first response.The book will be of interest to anybody involved in the design, realization and use of secure and privacy-preserving pervasive computing systems and applications. Ubiquitous computing Security measures. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Informatique omniprésente Sécurité Mesures. Chiffrement (Informatique) COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Data encryption (Computer science) fast IOS Press. http://id.loc.gov/authorities/names/no2015091156 has work: Multilaterally secure pervasive cooperation (Text) https://id.oclc.org/worldcat/entity/E39PCFGYyYyVfGGwjjXx968cT3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Weber, Stefan G. Multilaterally secure pervasive cooperation. Amsterdam ; Washington, D.C. : IOS Press, ©2012 (DLC) 2012951489 Cryptology and information security series ; v. 9. http://id.loc.gov/authorities/names/no2008086431 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529563 Volltext |
spellingShingle | Weber, Stefan G. Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing / Cryptology and information security series ; Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ... ; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking Ubiquitous computing Security measures. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Informatique omniprésente Sécurité Mesures. Chiffrement (Informatique) COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Data encryption (Computer science) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001524 |
title | Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing / |
title_auth | Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing / |
title_exact_search | Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing / |
title_full | Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing / Stefan G. Weber. |
title_fullStr | Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing / Stefan G. Weber. |
title_full_unstemmed | Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing / Stefan G. Weber. |
title_short | Multilaterally secure pervasive cooperation : |
title_sort | multilaterally secure pervasive cooperation privacy protection accountability and secure communication for the age of pervasive computing |
title_sub | privacy protection, accountability and secure communication for the age of pervasive computing / |
topic | Ubiquitous computing Security measures. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Informatique omniprésente Sécurité Mesures. Chiffrement (Informatique) COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Data encryption (Computer science) fast |
topic_facet | Ubiquitous computing Security measures. Data encryption (Computer science) Informatique omniprésente Sécurité Mesures. Chiffrement (Informatique) COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529563 |
work_keys_str_mv | AT weberstefang multilaterallysecurepervasivecooperationprivacyprotectionaccountabilityandsecurecommunicationfortheageofpervasivecomputing AT iospress multilaterallysecurepervasivecooperationprivacyprotectionaccountabilityandsecurecommunicationfortheageofpervasivecomputing |