Secure communications and data management in ubiquitous services
β Scribed by Ching-Hsien Hsu; Jong Hyuk Park; Laurence T. Yang; Mario Freire
- Publisher
- John Wiley and Sons
- Year
- 2009
- Tongue
- English
- Weight
- 47 KB
- Volume
- 22
- Category
- Article
- ISSN
- 1074-5351
- DOI
- 10.1002/dac.1057
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
The Internet is an almost ideal means for information retrieval and exchange. It is cost-effective, easy to use and easily accessible. However, it can also be susceptible to devious practices such as data tempering, eavesdropping and theft. This paper analyses secure virtual private networks (VPNs)
The most frequently used operating systems with integrated security features (like Unix, Windows NT) use a security approach that is based on discretionary access control (DAC). DAC does not deal with data-Β―ow, but access rights, which are assigned to subjects or objects. A subject is granted or den
## Abstract With the increasing demand of ubiquitous computing, the interconnection of mobile __ad hoc__ network (MANET) to internet is also getting attractive, which is soβcalled hybrid or connected MANET. Further, as the use of multipath __ad hoc__ routing protocols is favorable in many applicati