MARC details
000 -LEADER |
fixed length control field |
02813cam a22002654a 4500 |
001 - CONTROL NUMBER |
control field |
vtls000001864 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
VRT |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250102222428.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
081111s2005 nyua |b 101 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0387234616 (alk. paper) |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
201402040059 |
Level of effort used to assign nonsubject heading access points |
VLOAD |
Level of effort used to assign subject headings |
201010090806 |
Level of effort used to assign classification |
malmash |
Level of effort used to assign subject headings |
200811171243 |
Level of effort used to assign classification |
venkatrajand |
Level of effort used to assign subject headings |
200811111206 |
Level of effort used to assign classification |
Noora |
-- |
200811111205 |
-- |
Noora |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.5915 |
Item number |
.P75 2005 |
245 00 - TITLE STATEMENT |
Title |
Privacy, Security, and Trust within the Context of Pervasive Computing / |
Statement of responsibility, etc. |
edited by Philip Robinson, Harald Vogt, Waleed Wagealla. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
Springer, |
Date of publication, distribution, etc. |
c2005. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
viii, 167 p. : |
Other physical details |
ill. ; |
Dimensions |
25 cm. |
440 #4 - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
The Kluwer international series in engineering and computer science ; |
Volume/sequential designation |
SECS 780 |
9 (RLIN) |
1262 |
500 ## - GENERAL NOTE |
General note |
Proceedings of a workshop. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and indexes. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Preface.- Acknowledgments.- Some Research Challenges in Pervasive Computing.- Part I: The Influence of Context on Privacy, Trust and Security. Overview. Survey on Location Privacy in Pervasive Computing. Exploring the Relationship between Context and Privacy. Privacy, Security and Trust Issues Raised by the Personal Server Concept.- Part II: Secure Trust Models and Management in Pervasive Computing. Overview. the Role of Identity in Pervasive Computational Trust. Towards a Next-Generation Trust Management Infrastructure for Open Computing Systems. Research Directions for Trust and Security in Human-Centric Computing.- Part III: Evidence, Authentication, and Identity. Overview. User-Centric Identity Management in Open Mobile Environments. Pre-Authentication Using Infrared. Architecture and Protocol for Authorized Transient Control.- Part IV: Social and Technical Approaches to Privacy Protection. Overview. Maintaining Privacy in RFID Enabled Environments. Safeguarding Personal Data Using Trusted Computing in Pervasive Computing. A Social Approach to Privacy in Location-Enhanced Computing. Author Index. Topic Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the atomic problems, leading to a more complete understanding of the social and technical issues in pervasive computing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ubiquitous computing |
9 (RLIN) |
1263 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Mobile computing |
9 (RLIN) |
1264 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
9 (RLIN) |
1265 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Suppress in OPAC |
No |
Koha item type |
Books |