Serveur d'exploration sur la musique en Sarre

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Security and Privacy in Pervasive Computing State of the Art and Future Directions

Identifieur interne : 000A80 ( Main/Exploration ); précédent : 000A79; suivant : 000A81

Security and Privacy in Pervasive Computing State of the Art and Future Directions

Auteurs : Dieter Hutter [Allemagne] ; Werner Stephan [Allemagne] ; Markus Ullmann [Allemagne]

Source :

RBID : ISTEX:0BE675BBBAE136F582B282904CE4F47F6F9A85BB

English descriptors

Abstract

Abstract: This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy issues specific to pervasive computing and how to address these issues with appropriate means.

Url:
DOI: 10.1007/978-3-540-39881-3_24


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Security and Privacy in Pervasive Computing State of the Art and Future Directions</title>
<author>
<name sortKey="Hutter, Dieter" sort="Hutter, Dieter" uniqKey="Hutter D" first="Dieter" last="Hutter">Dieter Hutter</name>
</author>
<author>
<name sortKey="Stephan, Werner" sort="Stephan, Werner" uniqKey="Stephan W" first="Werner" last="Stephan">Werner Stephan</name>
</author>
<author>
<name sortKey="Ullmann, Markus" sort="Ullmann, Markus" uniqKey="Ullmann M" first="Markus" last="Ullmann">Markus Ullmann</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:0BE675BBBAE136F582B282904CE4F47F6F9A85BB</idno>
<date when="2004" year="2004">2004</date>
<idno type="doi">10.1007/978-3-540-39881-3_24</idno>
<idno type="url">https://api.istex.fr/document/0BE675BBBAE136F582B282904CE4F47F6F9A85BB/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000122</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000122</idno>
<idno type="wicri:Area/Istex/Curation">000117</idno>
<idno type="wicri:Area/Istex/Checkpoint">000875</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000875</idno>
<idno type="wicri:doubleKey">0302-9743:2004:Hutter D:security:and:privacy</idno>
<idno type="wicri:Area/Main/Merge">000A80</idno>
<idno type="wicri:Area/Main/Curation">000A80</idno>
<idno type="wicri:Area/Main/Exploration">000A80</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Security and Privacy in Pervasive Computing State of the Art and Future Directions</title>
<author>
<name sortKey="Hutter, Dieter" sort="Hutter, Dieter" uniqKey="Hutter D" first="Dieter" last="Hutter">Dieter Hutter</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken</wicri:regionArea>
<placeName>
<region type="land" nuts="2">Sarre (Land)</region>
<settlement type="city">Sarrebruck</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Stephan, Werner" sort="Stephan, Werner" uniqKey="Stephan W" first="Werner" last="Stephan">Werner Stephan</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>German Research Center for Artificial Intelligence GmbH, Stuhlsatzenhausweg 3, 66123, Saarbrücken</wicri:regionArea>
<placeName>
<region type="land" nuts="2">Sarre (Land)</region>
<settlement type="city">Sarrebruck</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Ullmann, Markus" sort="Ullmann, Markus" uniqKey="Ullmann M" first="Markus" last="Ullmann">Markus Ullmann</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>German Federal Office for Information Security, Godesberger Allee 185-187, 53133, Bonn</wicri:regionArea>
<placeName>
<region type="land" nuts="1">Rhénanie-du-Nord-Westphalie</region>
<region type="district" nuts="2">District de Cologne</region>
<settlement type="city">Bonn</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2004</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="Teeft" xml:lang="en">
<term>Access code</term>
<term>Access security</term>
<term>Active batches</term>
<term>Active sensors</term>
<term>Afternoon session</term>
<term>Airport environment</term>
<term>Application area</term>
<term>Application scenario</term>
<term>Application scenarios</term>
<term>Appropriate connection trains</term>
<term>Authentication</term>
<term>Authentication procedures</term>
<term>Available computer infrastructure</term>
<term>Base stations</term>
<term>Berlin heidelberg</term>
<term>Business cases</term>
<term>Carl ellison</term>
<term>Central data banks</term>
<term>Central questions</term>
<term>Central surveillance center</term>
<term>Certain resources</term>
<term>Certain rules</term>
<term>Common approaches</term>
<term>Common language</term>
<term>Common security policy</term>
<term>Communication lines</term>
<term>Computer sessions</term>
<term>Computer system monitors</term>
<term>Conference participants</term>
<term>Contact physician</term>
<term>Control access</term>
<term>Credit card</term>
<term>Critical components</term>
<term>Cryptographic support</term>
<term>Current state</term>
<term>Data music</term>
<term>Decrease trust</term>
<term>Dieter hutter</term>
<term>Digital rights</term>
<term>Dynamic trust models</term>
<term>Electronic infrastructure</term>
<term>Electronic relationship</term>
<term>Enumeration sketches</term>
<term>External intruder</term>
<term>Fruitful discussion</term>
<term>Future directions dieter hutter1 werner stephan1</term>
<term>German research center</term>
<term>Global network</term>
<term>Godesberger allee</term>
<term>Home automation</term>
<term>Hostile environment</term>
<term>Independent devices</term>
<term>Information security</term>
<term>Infrastructure</term>
<term>Intelligence gmbh</term>
<term>International conference</term>
<term>Likely applications</term>
<term>Limited resources</term>
<term>Limited time period</term>
<term>Local information</term>
<term>Local nodes</term>
<term>Location privacy</term>
<term>Many services</term>
<term>Markus ullmann</term>
<term>Markus ullmann2</term>
<term>Mass production</term>
<term>Media entertainment</term>
<term>Medical documentations</term>
<term>Medical records</term>
<term>Mobile code</term>
<term>Mobile phones</term>
<term>More contactless</term>
<term>Music titles</term>
<term>Nearest automobile dealer</term>
<term>Necessary prerequisite</term>
<term>Other components</term>
<term>Other systems</term>
<term>Passenger trust</term>
<term>Persistent state</term>
<term>Personal data</term>
<term>Personal device</term>
<term>Personal equipment</term>
<term>Pervasive</term>
<term>Pervasive device</term>
<term>Pervasive devices</term>
<term>Pervasive world</term>
<term>Physical environment</term>
<term>Physical location</term>
<term>Plain text</term>
<term>Possible attacker</term>
<term>Possible imposition</term>
<term>Potential application areas</term>
<term>Printer room</term>
<term>Privacy issues</term>
<term>Privacy problems</term>
<term>Privacy requirements</term>
<term>Public buildings</term>
<term>Public transportation</term>
<term>Redirection information</term>
<term>Remote maintenance procedures</term>
<term>Research funding organizations</term>
<term>Resistant hardware</term>
<term>Resource boundedness limits</term>
<term>Salient features</term>
<term>Scenario</term>
<term>Scheduling information</term>
<term>Security challenges</term>
<term>Security guarantees</term>
<term>Security mechanism security policies</term>
<term>Security mechanisms</term>
<term>Security policies</term>
<term>Security policy</term>
<term>Security protocols</term>
<term>Sensitive information</term>
<term>Service facilities</term>
<term>Services devices</term>
<term>Shopping malls</term>
<term>Short summary1</term>
<term>Smart devices</term>
<term>Spontaneous communication</term>
<term>Spontaneous manner boundedness</term>
<term>Stationary equipment</term>
<term>Successful operation</term>
<term>Such environments</term>
<term>Such infrastructures</term>
<term>Suitable actions</term>
<term>Support researchers</term>
<term>Surveillance system</term>
<term>Telephone numbers</term>
<term>Television programs</term>
<term>Theft protection</term>
<term>Third parties</term>
<term>Today cars</term>
<term>Traditional security mechanisms</term>
<term>Transportation scenario</term>
<term>Trust management</term>
<term>Ubicom solutions</term>
<term>Umts environment</term>
<term>Unknown devices</term>
<term>Untrusted environment</term>
<term>User preferences</term>
<term>Various conference participants</term>
<term>Various questions</term>
<term>Vast amounts</term>
<term>Werner stephan</term>
<term>Whole system</term>
<term>Wireless communication</term>
<term>Wireless communication technologies</term>
<term>Wrong medications</term>
</keywords>
</textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy issues specific to pervasive computing and how to address these issues with appropriate means.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Allemagne</li>
</country>
<region>
<li>District de Cologne</li>
<li>Rhénanie-du-Nord-Westphalie</li>
<li>Sarre (Land)</li>
</region>
<settlement>
<li>Bonn</li>
<li>Sarrebruck</li>
</settlement>
</list>
<tree>
<country name="Allemagne">
<region name="Sarre (Land)">
<name sortKey="Hutter, Dieter" sort="Hutter, Dieter" uniqKey="Hutter D" first="Dieter" last="Hutter">Dieter Hutter</name>
</region>
<name sortKey="Hutter, Dieter" sort="Hutter, Dieter" uniqKey="Hutter D" first="Dieter" last="Hutter">Dieter Hutter</name>
<name sortKey="Stephan, Werner" sort="Stephan, Werner" uniqKey="Stephan W" first="Werner" last="Stephan">Werner Stephan</name>
<name sortKey="Stephan, Werner" sort="Stephan, Werner" uniqKey="Stephan W" first="Werner" last="Stephan">Werner Stephan</name>
<name sortKey="Ullmann, Markus" sort="Ullmann, Markus" uniqKey="Ullmann M" first="Markus" last="Ullmann">Markus Ullmann</name>
<name sortKey="Ullmann, Markus" sort="Ullmann, Markus" uniqKey="Ullmann M" first="Markus" last="Ullmann">Markus Ullmann</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Sarre/explor/MusicSarreV3/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000A80 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000A80 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Sarre
   |area=    MusicSarreV3
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:0BE675BBBAE136F582B282904CE4F47F6F9A85BB
   |texte=   Security and Privacy in Pervasive Computing State of the Art and Future Directions
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Sun Jul 15 18:16:09 2018. Site generation: Tue Mar 5 19:21:25 2024