Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Long-Term & Dynamical Aspects of Information Security -

Long-Term & Dynamical Aspects of Information Security

Emerging Trends in Information & Communication Security
Buch | Hardcover
168 Seiten
2007
Nova Science Publishers Inc (Verlag)
978-1-60021-912-2 (ISBN)
CHF 317,50 inkl. MwSt
Deals with computer security technology that operates in rapidly changing environments. This book contains a proposal to quantify the time scales on which IT security lives. It identifies three main axes: the time scale of practical relevance; the technological research and development (R&D) time scale; the event horizon of the technology.
The first six papers deal with computer security technology that operates in rapidly changing environments and has to adapt to their shifting conditions. The technology or application envisaged in the second six operates or assumes a static outcome that can, for instance, be used forensically. The second half of the book contains a proposal to quantify the time scales on which IT security lives may be a major contribution of this volume. The authors identify three main axes. First, the time scale of practical relevance. It denominates approximately the middle of the time range during which the problem treated by the technology becomes imminent to the IS&T community, through the demands of the market. Second, the technological research and development (R&D) time scale. It is a forecast of when the technological solution will be "there". This means in effect the first of two milestones in technology evolution: a) when a technology has made the breakthrough to be in principle, ie: theoretically and economically applicable and viable, and b) when it is matured to reach prevalence in IS&T, ie: to become textbook standard. The second point in time hinges obviously on external factors not amenable to analysis within the discipline proper. Third, we have the event horizon of the technology in question. That deals with the issue of the sustainability of the solution: May it be surpassed by the skills of attackers using advances in other areas? Can it be foreseen that it will be overcome by even better solutions?

Preface; An Approach for Secure Usability for Ambient Intelligence Environments; Analysis of Privacy Policies for Dynamic Systems; Preserving Privacy in the Web by Using Information Flow Control; Geographically Secure Routing for Mobile Ad Hoc Networks: A Cross-Layer Based Approach; Open Ambient: A Pervasive Access Control Architecture; Evaluation of PC-based Real-Time Watermarking System for Long-Term Video Preservation; Long-term Secure Key Establishment; Applicability of Quantum Cryptography for Securing Mobile Communication Networks; Long-term Security for Signed Documents: Services, Protocols, and Data Structures; Why Digital Signatures Fail- Legal Concepts for Long Term Validity in Austria, Germany and Poland; Providing Evidence with Transformed Signed Documents; Design Strategies for Secure Embedded Networking; Index.

Zusatzinfo Illustrations, unspecified
Verlagsort New York
Sprache englisch
Maße 260 x 180 mm
Gewicht 606 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-60021-912-8 / 1600219128
ISBN-13 978-1-60021-912-2 / 9781600219122
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
CHF 132,90