{"title":"普适计算的安全性","authors":"Tobias Straub, A. Heinemann","doi":"10.4018/978-1-59904-832-1.CH015","DOIUrl":null,"url":null,"abstract":"Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security for Ubiquitous Computing\",\"authors\":\"Tobias Straub, A. Heinemann\",\"doi\":\"10.4018/978-1-59904-832-1.CH015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.\",\"PeriodicalId\":443285,\"journal\":{\"name\":\"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-59904-832-1.CH015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-59904-832-1.CH015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.