Privacy, Security, and Trust within the Context of Pervasive Computing / (Record no. 366)

MARC details
000 -LEADER
fixed length control field 02813cam a22002654a 4500
001 - CONTROL NUMBER
control field vtls000001864
003 - CONTROL NUMBER IDENTIFIER
control field VRT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250102222428.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 081111s2005 nyua |b 101 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0387234616 (alk. paper)
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 201402040059
Level of effort used to assign nonsubject heading access points VLOAD
Level of effort used to assign subject headings 201010090806
Level of effort used to assign classification malmash
Level of effort used to assign subject headings 200811171243
Level of effort used to assign classification venkatrajand
Level of effort used to assign subject headings 200811111206
Level of effort used to assign classification Noora
-- 200811111205
-- Noora
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.5915
Item number .P75 2005
245 00 - TITLE STATEMENT
Title Privacy, Security, and Trust within the Context of Pervasive Computing /
Statement of responsibility, etc. edited by Philip Robinson, Harald Vogt, Waleed Wagealla.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. c2005.
300 ## - PHYSICAL DESCRIPTION
Extent viii, 167 p. :
Other physical details ill. ;
Dimensions 25 cm.
440 #4 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title The Kluwer international series in engineering and computer science ;
Volume/sequential designation SECS 780
9 (RLIN) 1262
500 ## - GENERAL NOTE
General note Proceedings of a workshop.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and indexes.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Preface.- Acknowledgments.- Some Research Challenges in Pervasive Computing.- Part I: The Influence of Context on Privacy, Trust and Security. Overview. Survey on Location Privacy in Pervasive Computing. Exploring the Relationship between Context and Privacy. Privacy, Security and Trust Issues Raised by the Personal Server Concept.- Part II: Secure Trust Models and Management in Pervasive Computing. Overview. the Role of Identity in Pervasive Computational Trust. Towards a Next-Generation Trust Management Infrastructure for Open Computing Systems. Research Directions for Trust and Security in Human-Centric Computing.- Part III: Evidence, Authentication, and Identity. Overview. User-Centric Identity Management in Open Mobile Environments. Pre-Authentication Using Infrared. Architecture and Protocol for Authorized Transient Control.- Part IV: Social and Technical Approaches to Privacy Protection. Overview. Maintaining Privacy in RFID Enabled Environments. Safeguarding Personal Data Using Trusted Computing in Pervasive Computing. A Social Approach to Privacy in Location-Enhanced Computing. Author Index. Topic Index.
520 ## - SUMMARY, ETC.
Summary, etc. Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the atomic problems, leading to a more complete understanding of the social and technical issues in pervasive computing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ubiquitous computing
9 (RLIN) 1263
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mobile computing
9 (RLIN) 1264
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
9 (RLIN) 1265
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Suppress in OPAC No
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Library Library First Floor 21/12/2024   QA76.5915 .P75 2005 11159 21/12/2024 1 21/12/2024 Books
New Arrivals

Loading...

Contact Us

Library: Location maps

Phone: 00968 2323 7091 Email: Ask us a question

Library Hours

Sunday - Thursday 7:30AM - 8:00 PM

Friday - Saturday Closed