The mechanisms which support secure communication, privacy protection and accountability are crucial parts of most computing systems. Pervasive computing is characterized by the large-scale collection, distribution and aggregation of information related to individuals and their activities. From the outset, the inherent privacy and IT security issues of pervasive computing have been an area of critical focus, and associated unforeseeable consequences for the individual have been mentioned. This book addresses these issues, and seeks to demonstrate that carefully devised protection mechanisms can become enablers for multilaterally acceptable and trustworthy digital interactions and ICT-based cooperations. It explores new facets of privacy protection and accountability for digitally recorded real-world actions as well as novel forms of communication in a descriptive manner.A thorough investigation of main pervasive computing concepts is presented, together with a motivation and elicitation of security requirements within the emergency response application domain; also the state-of-the-art of existing security mechanisms is discussed. The areas covered include: digital pseudonyms and auditing mechanisms, efficient encryption techniques and concepts for end-to-end secure messaging, as well as pervasive computing approaches to first response.The book will be of interest to anybody involved in the design, realization and use of secure and privacy-preserving pervasive computing systems and applications.
We are closely approaching the age of Pervasive Computing. This post-desktop era of computing is shaped by a large scale collection, distribution and aggregation of information related to individuals and their activities. From the beginning of pervasive computing research, the inherent privacy and IT security issues and the associated unforeseeable consequences for the individual were critically mentioned.
The present book Multilaterally Secure Pervasive Cooperation - Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing addresses this challenge in order to demonstrate that carefully devised protection mechanisms can become enablers for multilaterally acceptable and trustworthy digital interactions and cooperations. It contributes to the design of multilaterally secure cooperative pervasive systems by taking a scenario-oriented approach.
In most computing systems, the mechanisms that support secure communication, privacy protection and accountability are considered as major functional parts. In pervasive computing applications, these functionalities are facing an extension of their scopes. Based on the reference scenario of ICT-supported emergency response, this book conveys new facets of privacy protection, accountability for digitally recorded real-world actions and novel forms of communication in a descriptive manner.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 email@example.com
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 firstname.lastname@example.org