Record:   Prev Next
作者 Weber, S.G
書名 Multilaterally Secure Pervasive Cooperation
出版項 Amsterdam : IOS Press, 2012
©2012
國際標準書號 9781614991571 (electronic bk.)
9781614991564
book jacket
說明 1 online resource (196 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
附註 Title Page -- Preface -- Contents -- List of Figures -- List of Tables -- Introduction -- Motivation -- Object of Research -- Goals and Research Questions -- Approach and Scientific Contributions -- Evaluation -- Publications -- Structure -- Background and Requirements -- What is Pervasive Computing? -- Perspective -- From Product Traceability ... -- .. to Human-Centric Pervasive Applications -- Main Components of Pervasive Systems -- Towards Pervasive Cooperation -- Some Security Issues in Pervasive Computing -- IT Security, Multilateral Security and Pervasive Systems -- The Challenge of Securing a Pervasive System -- Privacy and the Need for Privacy Protection -- Privacy Protection versus Accountability -- Reference Scenario: ICT-Supported Emergency Response -- Introduction to Application Domain -- Disaster Management Information Systems -- Towards Location-Aware First Response -- Protection Goals Motivated within Reference Scenario -- One-to-Many Communication in Emergency Situations -- Emergency Communication Patterns -- Security Requirements for Emergency Communication -- Privacy and Accountability Issues of Real-World Auditing -- Application Examples within Reference Scenario -- Security Requirements for Multilaterally Secure Auditing -- Summary -- State of the Art -- The Broader Context -- Towards Multilaterally Secure Pervasive Auditing -- Relevant Properties of Digital Pseudonyms -- Location Privacy Protection based on Pseudonyms -- Pseudonymous Auditing -- Efficient Constructions of Transaction Pseudonyms -- Conclusion -- Towards End-to-End Secure Pervasive Communication -- Approaches to Secure One-to-Many Messaging -- Techniques for End-to-End Encryption -- Conclusion -- Summary -- Novel Security Techniques -- Pseudonyms with Implicit Attributes -- Construction Principle -- Main Primitives -- Setting and Main Protocols -- Parties
Registration and Generation of Transaction Pseudonyms -- Authentication of Transaction Pseudonyms -- Linking and Partial Re-Identification -- Complete Disclosure of Pseudonyms -- Hybrid Encryption Technique for Expressive Policies -- Construction Principle -- Main Primitives -- Setting and Main Mechanisms for Hybrid Encryption -- Parties -- Encryption and Decryption Schemes -- Management and Generation of Private Keys -- Summary -- Integrated Approach within Reference Scenario -- Overview -- Parties -- Core Interactions -- Design of Security Mechanisms -- Basic Principles -- Make Users Implicitly Addressable via Attributes -- Provide Pseudonymous yet Linkable Location Updates -- Communication Network Model -- Adversary Model -- Properties of Outside Adversary -- Properties of Inside Adversary -- Further Types of Adversaries -- System Overview -- Parties and Modules -- Phases -- Interactions -- Summary -- Mechanisms -- Setup -- Registration -- Representation of Digital Identities -- Registration Process -- Activation and Group Communication -- Overview -- Logical Messaging Policy Layer -- Access Control Layer -- Protocol for End-to-End Secure Messaging -- Examples -- Location Tracking -- Multilaterally Secure Auditing -- Overview -- Log Analysis Mechanisms -- Disclosure Policy and Provision of Authorization Sets -- Mechanism for Individual Log Access -- Transparency Mechanisms -- Scenario and Application Example -- Summary -- Evaluation and Discussion -- Technical Feasibility -- Prototype of Auditing Mechanisms -- Storage Overhead induced by Transaction Pseudonyms -- Prototype Implementation of ABM -- Resource Consumptions of ABM -- Security -- Security Analysis of Auditing -- Trust Requirements relevant to Auditing -- Independent Security Review of Pseudonymization Technique -- Discussion of Hybrid Encryption Technique
Security Analysis of Communication Mechanisms -- Appropriateness -- Using Pseudonymized Location Traces in Legal Disputes -- Supporting Appropriateness of ABM to End Users -- Applicability -- Pseudonyms with Implicit Attributes -- Multilaterally Secure Auditing -- Hybrid Encryption Technique -- End-To-End Secure ABM -- Summary -- Summary -- Contributions -- Conclusion -- Outlook -- Bibliography
Description based on publisher supplied metadata and other sources
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries
鏈接 Print version: Weber, S.G. Multilaterally Secure Pervasive Cooperation Amsterdam : IOS Press,c2012 9781614991564
主題 Internet -- Congresses.;World Wide Web -- Congresses
Electronic books
Record:   Prev Next