Book by None
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, open interconnected systems are much more vulnerable to attacks and unauthorized data access.
In the context of this threat, this book provides a comprehensive guide to security and privacy and trust in data management.
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems are much more vulnerable to attacks and unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy.
In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect to security, privacy and trust. After the introductory part that offers a perspective on privacy and security issues in the modern digital world, the contributions from leading researchers are grouped into sections on data and system security, privacy-enhancing techniques, digital asset protection, and selected topics on privacy and security in ambient intelligence. Overall, the book delivers, from information on the ethical and legislative background, to chapters on the state-of-the-art technologies such as access control, identity management and digital rights management to advice on implementing fair information practices and preventing security and privacy violations.
With this broad approach, this book appeals equally to researchers and graduate students looking for an overview of this area of ever-growing importance and to professional developers who require sound theoretical grounds for the design and implementation of secure privacy-preserving ubiquitous applications.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerEUR 14,25 für den Versand von Vereinigtes Königreich nach USA
Versandziele, Kosten & DauerAnbieter: ThriftBooks-Dallas, Dallas, TX, USA
Hardcover. Zustand: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 2.1. Artikel-Nr. G3540698604I5N00
Anzahl: 1 verfügbar
Anbieter: books4less (Versandantiquariat Petra Gros GmbH & Co. KG), Welling, Deutschland
gebundene Ausgabe. Zustand: Gut. 472 Seiten; Das hier angebotene Buch stammt aus einer teilaufgelösten wissenschaftlichen Bibliothek und trägt die entsprechenden Kennzeichnungen (Rückenschild, Instituts-Stempel.); Schnitt und Einband sind etwas staubschmutzig; der Buchzustand ist ansonsten ordentlich und dem Alter entsprechend gut. Text in ENGLISCHER Sprache! Sprache: Englisch Gewicht in Gramm: 950. Artikel-Nr. 1586851
Anzahl: 1 verfügbar
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Hervorragend. Zustand: Hervorragend | Seiten: 496 | Sprache: Englisch | Produktart: Bücher. Artikel-Nr. 3487102/1001
Anzahl: 1 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9783540698609_new
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these technologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- ment to authorize transactions may arise. Authorization may in turn call for some kind of user authentication. When users have to provide personal inf- mation to access services, they literally leave a part of their life on record. As the number of sites where such records are left increases, so does the d- ger of misuse. So-called identity theft has become a pervasive problem, and a general feeling of unease and lack of trust may dissuade people from using the services on o er. This,inanutshell,isoneofthemajorchallengesinsecurityengineering- day. How to provide servicesto individuals securelywithout making undue - cursions into their privacy at the same time. Decisions on the limits of privacy intrusions - or privacy protection, for that matter - are ultimately political decisions. Research can de ne the design space in which service providers and regulators may try to nd acceptable tradeo s between security and privacy. Artikel-Nr. 9783540698609
Anzahl: 1 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Hardcover. Zustand: Brand New. 1st edition. 471 pages. 9.25x6.25x1.25 inches. In Stock. Artikel-Nr. x-3540698604
Anzahl: 2 verfügbar