Serveur d'exploration sur la musique en Sarre

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Security and Privacy in Pervasive Computing State of the Art and Future Directions

Identifieur interne : 000122 ( Istex/Corpus ); précédent : 000121; suivant : 000123

Security and Privacy in Pervasive Computing State of the Art and Future Directions

Auteurs : Dieter Hutter ; Werner Stephan ; Markus Ullmann

Source :

RBID : ISTEX:0BE675BBBAE136F582B282904CE4F47F6F9A85BB

English descriptors

Abstract

Abstract: This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy issues specific to pervasive computing and how to address these issues with appropriate means.

Url:
DOI: 10.1007/978-3-540-39881-3_24

Links to Exploration step

ISTEX:0BE675BBBAE136F582B282904CE4F47F6F9A85BB

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Security and Privacy in Pervasive Computing State of the Art and Future Directions</title>
<author>
<name sortKey="Hutter, Dieter" sort="Hutter, Dieter" uniqKey="Hutter D" first="Dieter" last="Hutter">Dieter Hutter</name>
<affiliation>
<mods:affiliation>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: hutter@dfki.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Stephan, Werner" sort="Stephan, Werner" uniqKey="Stephan W" first="Werner" last="Stephan">Werner Stephan</name>
<affiliation>
<mods:affiliation>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: stephan@dfki.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Ullmann, Markus" sort="Ullmann, Markus" uniqKey="Ullmann M" first="Markus" last="Ullmann">Markus Ullmann</name>
<affiliation>
<mods:affiliation>German Federal Office for Information Security, Godesberger Allee 185-187, 53133, Bonn, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: markus.ullmann@bsi.bund.de</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:0BE675BBBAE136F582B282904CE4F47F6F9A85BB</idno>
<date when="2004" year="2004">2004</date>
<idno type="doi">10.1007/978-3-540-39881-3_24</idno>
<idno type="url">https://api.istex.fr/document/0BE675BBBAE136F582B282904CE4F47F6F9A85BB/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000122</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000122</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Security and Privacy in Pervasive Computing State of the Art and Future Directions</title>
<author>
<name sortKey="Hutter, Dieter" sort="Hutter, Dieter" uniqKey="Hutter D" first="Dieter" last="Hutter">Dieter Hutter</name>
<affiliation>
<mods:affiliation>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: hutter@dfki.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Stephan, Werner" sort="Stephan, Werner" uniqKey="Stephan W" first="Werner" last="Stephan">Werner Stephan</name>
<affiliation>
<mods:affiliation>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: stephan@dfki.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Ullmann, Markus" sort="Ullmann, Markus" uniqKey="Ullmann M" first="Markus" last="Ullmann">Markus Ullmann</name>
<affiliation>
<mods:affiliation>German Federal Office for Information Security, Godesberger Allee 185-187, 53133, Bonn, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: markus.ullmann@bsi.bund.de</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2004</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="Teeft" xml:lang="en">
<term>Access code</term>
<term>Access security</term>
<term>Active batches</term>
<term>Active sensors</term>
<term>Afternoon session</term>
<term>Airport environment</term>
<term>Application area</term>
<term>Application scenario</term>
<term>Application scenarios</term>
<term>Appropriate connection trains</term>
<term>Authentication</term>
<term>Authentication procedures</term>
<term>Available computer infrastructure</term>
<term>Base stations</term>
<term>Berlin heidelberg</term>
<term>Business cases</term>
<term>Carl ellison</term>
<term>Central data banks</term>
<term>Central questions</term>
<term>Central surveillance center</term>
<term>Certain resources</term>
<term>Certain rules</term>
<term>Common approaches</term>
<term>Common language</term>
<term>Common security policy</term>
<term>Communication lines</term>
<term>Computer sessions</term>
<term>Computer system monitors</term>
<term>Conference participants</term>
<term>Contact physician</term>
<term>Control access</term>
<term>Credit card</term>
<term>Critical components</term>
<term>Cryptographic support</term>
<term>Current state</term>
<term>Data music</term>
<term>Decrease trust</term>
<term>Dieter hutter</term>
<term>Digital rights</term>
<term>Dynamic trust models</term>
<term>Electronic infrastructure</term>
<term>Electronic relationship</term>
<term>Enumeration sketches</term>
<term>External intruder</term>
<term>Fruitful discussion</term>
<term>Future directions dieter hutter1 werner stephan1</term>
<term>German research center</term>
<term>Global network</term>
<term>Godesberger allee</term>
<term>Home automation</term>
<term>Hostile environment</term>
<term>Independent devices</term>
<term>Information security</term>
<term>Infrastructure</term>
<term>Intelligence gmbh</term>
<term>International conference</term>
<term>Likely applications</term>
<term>Limited resources</term>
<term>Limited time period</term>
<term>Local information</term>
<term>Local nodes</term>
<term>Location privacy</term>
<term>Many services</term>
<term>Markus ullmann</term>
<term>Markus ullmann2</term>
<term>Mass production</term>
<term>Media entertainment</term>
<term>Medical documentations</term>
<term>Medical records</term>
<term>Mobile code</term>
<term>Mobile phones</term>
<term>More contactless</term>
<term>Music titles</term>
<term>Nearest automobile dealer</term>
<term>Necessary prerequisite</term>
<term>Other components</term>
<term>Other systems</term>
<term>Passenger trust</term>
<term>Persistent state</term>
<term>Personal data</term>
<term>Personal device</term>
<term>Personal equipment</term>
<term>Pervasive</term>
<term>Pervasive device</term>
<term>Pervasive devices</term>
<term>Pervasive world</term>
<term>Physical environment</term>
<term>Physical location</term>
<term>Plain text</term>
<term>Possible attacker</term>
<term>Possible imposition</term>
<term>Potential application areas</term>
<term>Printer room</term>
<term>Privacy issues</term>
<term>Privacy problems</term>
<term>Privacy requirements</term>
<term>Public buildings</term>
<term>Public transportation</term>
<term>Redirection information</term>
<term>Remote maintenance procedures</term>
<term>Research funding organizations</term>
<term>Resistant hardware</term>
<term>Resource boundedness limits</term>
<term>Salient features</term>
<term>Scenario</term>
<term>Scheduling information</term>
<term>Security challenges</term>
<term>Security guarantees</term>
<term>Security mechanism security policies</term>
<term>Security mechanisms</term>
<term>Security policies</term>
<term>Security policy</term>
<term>Security protocols</term>
<term>Sensitive information</term>
<term>Service facilities</term>
<term>Services devices</term>
<term>Shopping malls</term>
<term>Short summary1</term>
<term>Smart devices</term>
<term>Spontaneous communication</term>
<term>Spontaneous manner boundedness</term>
<term>Stationary equipment</term>
<term>Successful operation</term>
<term>Such environments</term>
<term>Such infrastructures</term>
<term>Suitable actions</term>
<term>Support researchers</term>
<term>Surveillance system</term>
<term>Telephone numbers</term>
<term>Television programs</term>
<term>Theft protection</term>
<term>Third parties</term>
<term>Today cars</term>
<term>Traditional security mechanisms</term>
<term>Transportation scenario</term>
<term>Trust management</term>
<term>Ubicom solutions</term>
<term>Umts environment</term>
<term>Unknown devices</term>
<term>Untrusted environment</term>
<term>User preferences</term>
<term>Various conference participants</term>
<term>Various questions</term>
<term>Vast amounts</term>
<term>Werner stephan</term>
<term>Whole system</term>
<term>Wireless communication</term>
<term>Wireless communication technologies</term>
<term>Wrong medications</term>
</keywords>
</textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy issues specific to pervasive computing and how to address these issues with appropriate means.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<keywords>
<teeft>
<json:string>security policy</json:string>
<json:string>pervasive</json:string>
<json:string>infrastructure</json:string>
<json:string>pervasive devices</json:string>
<json:string>scenario</json:string>
<json:string>international conference</json:string>
<json:string>media entertainment</json:string>
<json:string>airport environment</json:string>
<json:string>printer room</json:string>
<json:string>authentication</json:string>
<json:string>markus ullmann</json:string>
<json:string>dieter hutter</json:string>
<json:string>security mechanisms</json:string>
<json:string>active sensors</json:string>
<json:string>personal data</json:string>
<json:string>werner stephan</json:string>
<json:string>unknown devices</json:string>
<json:string>pervasive world</json:string>
<json:string>security policies</json:string>
<json:string>security challenges</json:string>
<json:string>smart devices</json:string>
<json:string>carl ellison</json:string>
<json:string>berlin heidelberg</json:string>
<json:string>intelligence gmbh</json:string>
<json:string>information security</json:string>
<json:string>godesberger allee</json:string>
<json:string>physical location</json:string>
<json:string>fruitful discussion</json:string>
<json:string>available computer infrastructure</json:string>
<json:string>such infrastructures</json:string>
<json:string>sensitive information</json:string>
<json:string>mobile code</json:string>
<json:string>untrusted environment</json:string>
<json:string>other systems</json:string>
<json:string>more contactless</json:string>
<json:string>wireless communication technologies</json:string>
<json:string>spontaneous manner boundedness</json:string>
<json:string>privacy issues</json:string>
<json:string>limited resources</json:string>
<json:string>traditional security mechanisms</json:string>
<json:string>privacy problems</json:string>
<json:string>afternoon session</json:string>
<json:string>application scenario</json:string>
<json:string>conference participants</json:string>
<json:string>access code</json:string>
<json:string>short summary1</json:string>
<json:string>various questions</json:string>
<json:string>common language</json:string>
<json:string>common security policy</json:string>
<json:string>access security</json:string>
<json:string>central questions</json:string>
<json:string>passenger trust</json:string>
<json:string>plain text</json:string>
<json:string>personal equipment</json:string>
<json:string>stationary equipment</json:string>
<json:string>mobile phones</json:string>
<json:string>base stations</json:string>
<json:string>salient features</json:string>
<json:string>shopping malls</json:string>
<json:string>public buildings</json:string>
<json:string>vast amounts</json:string>
<json:string>markus ullmann2</json:string>
<json:string>surveillance system</json:string>
<json:string>location privacy</json:string>
<json:string>wireless communication</json:string>
<json:string>digital rights</json:string>
<json:string>data music</json:string>
<json:string>limited time period</json:string>
<json:string>german research center</json:string>
<json:string>spontaneous communication</json:string>
<json:string>likely applications</json:string>
<json:string>service facilities</json:string>
<json:string>communication lines</json:string>
<json:string>independent devices</json:string>
<json:string>future directions dieter hutter1 werner stephan1</json:string>
<json:string>common approaches</json:string>
<json:string>third parties</json:string>
<json:string>privacy requirements</json:string>
<json:string>possible attacker</json:string>
<json:string>external intruder</json:string>
<json:string>security mechanism security policies</json:string>
<json:string>successful operation</json:string>
<json:string>support researchers</json:string>
<json:string>personal device</json:string>
<json:string>security guarantees</json:string>
<json:string>electronic relationship</json:string>
<json:string>whole system</json:string>
<json:string>other components</json:string>
<json:string>trust management</json:string>
<json:string>hostile environment</json:string>
<json:string>such environments</json:string>
<json:string>dynamic trust models</json:string>
<json:string>decrease trust</json:string>
<json:string>suitable actions</json:string>
<json:string>possible imposition</json:string>
<json:string>security protocols</json:string>
<json:string>authentication procedures</json:string>
<json:string>resistant hardware</json:string>
<json:string>cryptographic support</json:string>
<json:string>pervasive device</json:string>
<json:string>umts environment</json:string>
<json:string>application scenarios</json:string>
<json:string>business cases</json:string>
<json:string>enumeration sketches</json:string>
<json:string>transportation scenario</json:string>
<json:string>public transportation</json:string>
<json:string>credit card</json:string>
<json:string>appropriate connection trains</json:string>
<json:string>redirection information</json:string>
<json:string>nearest automobile dealer</json:string>
<json:string>today cars</json:string>
<json:string>critical components</json:string>
<json:string>central surveillance center</json:string>
<json:string>remote maintenance procedures</json:string>
<json:string>contact physician</json:string>
<json:string>wrong medications</json:string>
<json:string>medical records</json:string>
<json:string>medical documentations</json:string>
<json:string>scheduling information</json:string>
<json:string>home automation</json:string>
<json:string>research funding organizations</json:string>
<json:string>various conference participants</json:string>
<json:string>music titles</json:string>
<json:string>persistent state</json:string>
<json:string>certain rules</json:string>
<json:string>user preferences</json:string>
<json:string>current state</json:string>
<json:string>global network</json:string>
<json:string>local information</json:string>
<json:string>television programs</json:string>
<json:string>local nodes</json:string>
<json:string>active batches</json:string>
<json:string>computer system monitors</json:string>
<json:string>electronic infrastructure</json:string>
<json:string>telephone numbers</json:string>
<json:string>computer sessions</json:string>
<json:string>application area</json:string>
<json:string>necessary prerequisite</json:string>
<json:string>many services</json:string>
<json:string>ubicom solutions</json:string>
<json:string>physical environment</json:string>
<json:string>central data banks</json:string>
<json:string>mass production</json:string>
<json:string>services devices</json:string>
<json:string>control access</json:string>
<json:string>certain resources</json:string>
<json:string>theft protection</json:string>
<json:string>potential application areas</json:string>
<json:string>resource boundedness limits</json:string>
</teeft>
</keywords>
<author>
<json:item>
<name>Dieter Hutter</name>
<affiliations>
<json:string>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</json:string>
<json:string>E-mail: hutter@dfki.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Werner Stephan</name>
<affiliations>
<json:string>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</json:string>
<json:string>E-mail: stephan@dfki.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Markus Ullmann</name>
<affiliations>
<json:string>German Federal Office for Information Security, Godesberger Allee 185-187, 53133, Bonn, Germany</json:string>
<json:string>E-mail: markus.ullmann@bsi.bund.de</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy issues specific to pervasive computing and how to address these issues with appropriate means.</abstract>
<qualityIndicators>
<score>2.574</score>
<pdfWordCount>1962</pdfWordCount>
<pdfCharCount>12205</pdfCharCount>
<pdfVersion>1.3</pdfVersion>
<pdfPageCount>5</pdfPageCount>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<abstractWordCount>51</abstractWordCount>
<abstractCharCount>337</abstractCharCount>
<keywordCount>0</keywordCount>
</qualityIndicators>
<title>Security and Privacy in Pervasive Computing State of the Art and Future Directions</title>
<chapterId>
<json:string>24</json:string>
<json:string>Chap24</json:string>
</chapterId>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<title>Lecture Notes in Computer Science</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2004</copyrightDate>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<editor>
<json:item>
<name>Gerhard Goos</name>
<affiliations>
<json:string>Karlsruhe University, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Juris Hartmanis</name>
<affiliations>
<json:string>Cornell University, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jan van Leeuwen</name>
<affiliations>
<json:string>Utrecht University, The Netherlands</json:string>
</affiliations>
</json:item>
</editor>
</serie>
<host>
<title>Security in Pervasive Computing</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2004</copyrightDate>
<doi>
<json:string>10.1007/b95124</json:string>
</doi>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<eisbn>
<json:string>978-3-540-39881-3</json:string>
</eisbn>
<bookId>
<json:string>978-3-540-39881-3</json:string>
</bookId>
<isbn>
<json:string>978-3-540-20887-7</json:string>
</isbn>
<volume>2802</volume>
<pages>
<first>285</first>
<last>289</last>
</pages>
<genre>
<json:string>book-series</json:string>
</genre>
<editor>
<json:item>
<name>Dieter Hutter</name>
<affiliations>
<json:string>DFKI, Stuhlsatzenhausweg 3, D-66123, Saarbrücken, Germany</json:string>
<json:string>E-mail: hutter@dfki.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Günter Müller</name>
<affiliations>
<json:string>Institute of Computer Science and Social Studies, Department of Telematics, Albert-Ludwig University Freiburg, Germany</json:string>
<json:string>E-mail: mueller@iig.uni-freiburg.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Werner Stephan</name>
<affiliations>
<json:string>German Research Center for Artificial Intelligence, DFKI GmbH,</json:string>
<json:string>E-mail: stephan@dfki.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Markus Ullmann</name>
<affiliations>
<json:string>Federal Office for Information Security (BSI), Godesberger Allee 185-189, 53175, Bonn, Germany</json:string>
<json:string>E-mail: markus.ullmann@bsi.bund.de</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Software Engineering</value>
</json:item>
<json:item>
<value>Operating Systems</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Information Systems Applications (incl.Internet)</value>
</json:item>
<json:item>
<value>Computers and Society</value>
</json:item>
</subject>
</host>
<categories>
<inist>
<json:string>sciences humaines et sociales</json:string>
</inist>
</categories>
<publicationDate>2004</publicationDate>
<copyrightDate>2004</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-39881-3_24</json:string>
</doi>
<id>0BE675BBBAE136F582B282904CE4F47F6F9A85BB</id>
<score>1</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/document/0BE675BBBAE136F582B282904CE4F47F6F9A85BB/fulltext/pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/document/0BE675BBBAE136F582B282904CE4F47F6F9A85BB/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/0BE675BBBAE136F582B282904CE4F47F6F9A85BB/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Security and Privacy in Pervasive Computing State of the Art and Future Directions</title>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>Springer-Verlag Berlin Heidelberg, 2004</p>
</availability>
<date>2004</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Security and Privacy in Pervasive Computing State of the Art and Future Directions</title>
<author xml:id="author-0000">
<persName>
<forename type="first">Dieter</forename>
<surname>Hutter</surname>
</persName>
<email>hutter@dfki.de</email>
<affiliation>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</affiliation>
</author>
<author xml:id="author-0001">
<persName>
<forename type="first">Werner</forename>
<surname>Stephan</surname>
</persName>
<email>stephan@dfki.de</email>
<affiliation>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</affiliation>
</author>
<author xml:id="author-0002">
<persName>
<forename type="first">Markus</forename>
<surname>Ullmann</surname>
</persName>
<email>markus.ullmann@bsi.bund.de</email>
<affiliation>German Federal Office for Information Security, Godesberger Allee 185-187, 53133, Bonn, Germany</affiliation>
</author>
<idno type="istex">0BE675BBBAE136F582B282904CE4F47F6F9A85BB</idno>
<idno type="DOI">10.1007/978-3-540-39881-3_24</idno>
<idno type="ChapterID">24</idno>
<idno type="ChapterID">Chap24</idno>
</analytic>
<monogr>
<title level="m">Security in Pervasive Computing</title>
<title level="m" type="sub">First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers</title>
<idno type="DOI">10.1007/b95124</idno>
<idno type="pISBN">978-3-540-20887-7</idno>
<idno type="eISBN">978-3-540-39881-3</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="book-title-ID">81241</idno>
<idno type="book-ID">978-3-540-39881-3</idno>
<idno type="book-chapter-count">24</idno>
<idno type="book-volume-number">2802</idno>
<idno type="book-sequence-number">2802</idno>
<idno type="PartChapterCount">1</idno>
<editor xml:id="book-author-0000">
<persName>
<forename type="first">Dieter</forename>
<surname>Hutter</surname>
</persName>
<email>hutter@dfki.de</email>
<affiliation>DFKI, Stuhlsatzenhausweg 3, D-66123, Saarbrücken, Germany</affiliation>
</editor>
<editor xml:id="book-author-0001">
<persName>
<forename type="first">Günter</forename>
<surname>Müller</surname>
</persName>
<email>mueller@iig.uni-freiburg.de</email>
<affiliation>Institute of Computer Science and Social Studies, Department of Telematics, Albert-Ludwig University Freiburg, Germany</affiliation>
</editor>
<editor xml:id="book-author-0002">
<persName>
<forename type="first">Werner</forename>
<surname>Stephan</surname>
</persName>
<email>stephan@dfki.de</email>
<affiliation>German Research Center for Artificial Intelligence, DFKI GmbH</affiliation>
</editor>
<editor xml:id="book-author-0003">
<persName>
<forename type="first">Markus</forename>
<surname>Ullmann</surname>
</persName>
<email>markus.ullmann@bsi.bund.de</email>
<affiliation>Federal Office for Information Security (BSI), Godesberger Allee 185-189, 53175, Bonn, Germany</affiliation>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2004"></date>
<biblScope unit="volume">2802</biblScope>
<biblScope unit="page" from="285">285</biblScope>
<biblScope unit="page" to="289">289</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor xml:id="serie-author-0000">
<persName>
<forename type="first">Gerhard</forename>
<surname>Goos</surname>
</persName>
<affiliation>Karlsruhe University, Germany</affiliation>
</editor>
<editor xml:id="serie-author-0001">
<persName>
<forename type="first">Juris</forename>
<surname>Hartmanis</surname>
</persName>
<affiliation>Cornell University, NY, USA</affiliation>
</editor>
<editor xml:id="serie-author-0002">
<persName>
<forename type="first">Jan</forename>
<surname>van Leeuwen</surname>
</persName>
<affiliation>Utrecht University, The Netherlands</affiliation>
</editor>
<biblScope>
<date>2004</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="series-Id">558</idno>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2004</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy issues specific to pervasive computing and how to address these issues with appropriate means.</p>
</abstract>
<textClass>
<keywords scheme="Book-Subject-Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book-Subject-Group">
<list>
<label>I</label>
<item>
<term>Computer Science</term>
</item>
<label>I13022</label>
<item>
<term>Computer Communication Networks</term>
</item>
<label>I14029</label>
<item>
<term>Software Engineering</term>
</item>
<label>I14045</label>
<item>
<term>Operating Systems</term>
</item>
<label>I15033</label>
<item>
<term>Data Encryption</term>
</item>
<label>I18040</label>
<item>
<term>Information Systems Applications (incl.Internet)</term>
</item>
<label>I24040</label>
<item>
<term>Computers and Society</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2004">Published</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/document/0BE675BBBAE136F582B282904CE4F47F6F9A85BB/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo TocLevels="0" SeriesType="Series">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Goos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Juris</GivenName>
<FamilyName>Hartmanis</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Jan</GivenName>
<Particle>van</Particle>
<FamilyName>Leeuwen</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Karlsruhe University</OrgName>
<OrgAddress>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>Utrecht University</OrgName>
<OrgAddress>
<Country>The Netherlands</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo Language="En" NumberingStyle="ContentOnly" NumberingDepth="2" OutputMedium="All" TocLevels="0" ContainsESM="No" BookProductType="Proceedings" MediaType="eBook">
<BookID>978-3-540-39881-3</BookID>
<BookTitle>Security in Pervasive Computing</BookTitle>
<BookSubTitle>First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers</BookSubTitle>
<BookVolumeNumber>2802</BookVolumeNumber>
<BookSequenceNumber>2802</BookSequenceNumber>
<BookDOI>10.1007/b95124</BookDOI>
<BookTitleID>81241</BookTitleID>
<BookPrintISBN>978-3-540-20887-7</BookPrintISBN>
<BookElectronicISBN>978-3-540-39881-3</BookElectronicISBN>
<BookChapterCount>24</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2004</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Type="Primary" Code="I">Computer Science</BookSubject>
<BookSubject Type="Secondary" Priority="1" Code="I13022">Computer Communication Networks</BookSubject>
<BookSubject Type="Secondary" Priority="2" Code="I14029">Software Engineering</BookSubject>
<BookSubject Type="Secondary" Priority="3" Code="I14045">Operating Systems</BookSubject>
<BookSubject Type="Secondary" Priority="4" Code="I15033">Data Encryption</BookSubject>
<BookSubject Type="Secondary" Priority="5" Code="I18040">Information Systems Applications (incl.Internet)</BookSubject>
<BookSubject Type="Secondary" Priority="6" Code="I24040">Computers and Society</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Dieter</GivenName>
<FamilyName>Hutter</FamilyName>
</EditorName>
<Contact>
<Email>hutter@dfki.de</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Günter</GivenName>
<FamilyName>Müller</FamilyName>
</EditorName>
<Contact>
<Email>mueller@iig.uni-freiburg.de</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>Werner</GivenName>
<FamilyName>Stephan</FamilyName>
</EditorName>
<Contact>
<Email>stephan@dfki.de</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff7">
<EditorName DisplayOrder="Western">
<GivenName>Markus</GivenName>
<FamilyName>Ullmann</FamilyName>
</EditorName>
<Contact>
<Email>markus.ullmann@bsi.bund.de</Email>
</Contact>
</Editor>
<Affiliation ID="Aff4">
<OrgName>DFKI</OrgName>
<OrgAddress>
<Street>Stuhlsatzenhausweg 3</Street>
<Postcode>D-66123</Postcode>
<City>Saarbrücken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgDivision>Institute of Computer Science and Social Studies, Department of Telematics</OrgDivision>
<OrgName>Albert-Ludwig University Freiburg</OrgName>
<OrgAddress>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgName>German Research Center for Artificial Intelligence, DFKI GmbH</OrgName>
<OrgAddress>
<Country> </Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgName>Federal Office for Information Security (BSI)</OrgName>
<OrgAddress>
<Street>Godesberger Allee 185-189</Street>
<Postcode>53175</Postcode>
<City>Bonn</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part10">
<PartInfo TocLevels="0">
<PartID>10</PartID>
<PartSequenceNumber>10</PartSequenceNumber>
<PartTitle>Workshop</PartTitle>
<PartChapterCount>1</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Security in Pervasive Computing</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap24" Language="En">
<ChapterInfo ChapterType="OriginalPaper" NumberingStyle="ContentOnly" NumberingDepth="2" TocLevels="0" ContainsESM="No">
<ChapterID>24</ChapterID>
<ChapterDOI>10.1007/978-3-540-39881-3_24</ChapterDOI>
<ChapterSequenceNumber>24</ChapterSequenceNumber>
<ChapterTitle Language="En">Security and Privacy in Pervasive Computing State of the Art and Future Directions</ChapterTitle>
<ChapterFirstPage>285</ChapterFirstPage>
<ChapterLastPage>289</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2004</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>10</PartID>
<BookID>978-3-540-39881-3</BookID>
<BookTitle>Security in Pervasive Computing</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff8">
<AuthorName DisplayOrder="Western">
<GivenName>Dieter</GivenName>
<FamilyName>Hutter</FamilyName>
</AuthorName>
<Contact>
<Email>hutter@dfki.de</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff8">
<AuthorName DisplayOrder="Western">
<GivenName>Werner</GivenName>
<FamilyName>Stephan</FamilyName>
</AuthorName>
<Contact>
<Email>stephan@dfki.de</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff9">
<AuthorName DisplayOrder="Western">
<GivenName>Markus</GivenName>
<FamilyName>Ullmann</FamilyName>
</AuthorName>
<Contact>
<Email>markus.ullmann@bsi.bund.de</Email>
</Contact>
</Author>
<Affiliation ID="Aff8">
<OrgName>German Research Center for Artificial Intelligence GmbH</OrgName>
<OrgAddress>
<Street>Stuhlsatzenhausweg 3</Street>
<Postcode>66123</Postcode>
<City>Saarbrücken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff9">
<OrgName>German Federal Office for Information Security</OrgName>
<OrgAddress>
<Street>Godesberger Allee 185-187</Street>
<Postcode>53133</Postcode>
<City>Bonn</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy issues specific to pervasive computing and how to address these issues with appropriate means.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Security and Privacy in Pervasive Computing State of the Art and Future Directions</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Security and Privacy in Pervasive Computing State of the Art and Future Directions</title>
</titleInfo>
<name type="personal">
<namePart type="given">Dieter</namePart>
<namePart type="family">Hutter</namePart>
<affiliation>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</affiliation>
<affiliation>E-mail: hutter@dfki.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Werner</namePart>
<namePart type="family">Stephan</namePart>
<affiliation>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken, Germany</affiliation>
<affiliation>E-mail: stephan@dfki.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Markus</namePart>
<namePart type="family">Ullmann</namePart>
<affiliation>German Federal Office for Information Security, Godesberger Allee 185-187, 53133, Bonn, Germany</affiliation>
<affiliation>E-mail: markus.ullmann@bsi.bund.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2004</dateIssued>
<copyrightDate encoding="w3cdtf">2004</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy issues specific to pervasive computing and how to address these issues with appropriate means.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Security in Pervasive Computing</title>
<subTitle>First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Dieter</namePart>
<namePart type="family">Hutter</namePart>
<affiliation>DFKI, Stuhlsatzenhausweg 3, D-66123, Saarbrücken, Germany</affiliation>
<affiliation>E-mail: hutter@dfki.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Günter</namePart>
<namePart type="family">Müller</namePart>
<affiliation>Institute of Computer Science and Social Studies, Department of Telematics, Albert-Ludwig University Freiburg, Germany</affiliation>
<affiliation>E-mail: mueller@iig.uni-freiburg.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Werner</namePart>
<namePart type="family">Stephan</namePart>
<affiliation>German Research Center for Artificial Intelligence, DFKI GmbH</affiliation>
<affiliation>E-mail: stephan@dfki.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Markus</namePart>
<namePart type="family">Ullmann</namePart>
<affiliation>Federal Office for Information Security (BSI), Godesberger Allee 185-189, 53175, Bonn, Germany</affiliation>
<affiliation>E-mail: markus.ullmann@bsi.bund.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2004</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14029">Software Engineering</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14045">Operating Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18040">Information Systems Applications (incl.Internet)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24040">Computers and Society</topic>
</subject>
<identifier type="DOI">10.1007/b95124</identifier>
<identifier type="ISBN">978-3-540-20887-7</identifier>
<identifier type="eISBN">978-3-540-39881-3</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">81241</identifier>
<identifier type="BookID">978-3-540-39881-3</identifier>
<identifier type="BookChapterCount">24</identifier>
<identifier type="BookVolumeNumber">2802</identifier>
<identifier type="BookSequenceNumber">2802</identifier>
<identifier type="PartChapterCount">1</identifier>
<part>
<date>2004</date>
<detail type="part">
<title>Workshop</title>
</detail>
<detail type="volume">
<number>2802</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>285</start>
<end>289</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2004</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Goos</namePart>
<affiliation>Karlsruhe University, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Juris</namePart>
<namePart type="family">Hartmanis</namePart>
<affiliation>Cornell University, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jan</namePart>
<namePart type="family">van Leeuwen</namePart>
<affiliation>Utrecht University, The Netherlands</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2004</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2004</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">0BE675BBBAE136F582B282904CE4F47F6F9A85BB</identifier>
<identifier type="DOI">10.1007/978-3-540-39881-3_24</identifier>
<identifier type="ChapterID">24</identifier>
<identifier type="ChapterID">Chap24</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2004</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2004</recordOrigin>
</recordInfo>
</mods>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Sarre/explor/MusicSarreV3/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000122 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 000122 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Sarre
   |area=    MusicSarreV3
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:0BE675BBBAE136F582B282904CE4F47F6F9A85BB
   |texte=   Security and Privacy in Pervasive Computing State of the Art and Future Directions
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Sun Jul 15 18:16:09 2018. Site generation: Tue Mar 5 19:21:25 2024