Reference Hub1
Security for Ubiquitous Computing

Security for Ubiquitous Computing

Tobias Straub, Andreas Heinemann
ISBN13: 9781599048321|ISBN10: 1599048329|EISBN13: 9781599048352
DOI: 10.4018/978-1-59904-832-1.ch015
Cite Chapter Cite Chapter

MLA

Straub, Tobias, and Andreas Heinemann. "Security for Ubiquitous Computing." Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises, edited by Max Mühlhäuser and Iryna Gurevych, IGI Global, 2008, pp. 337-362. https://doi.org/10.4018/978-1-59904-832-1.ch015

APA

Straub, T. & Heinemann, A. (2008). Security for Ubiquitous Computing. In M. Mühlhäuser & I. Gurevych (Eds.), Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises (pp. 337-362). IGI Global. https://doi.org/10.4018/978-1-59904-832-1.ch015

Chicago

Straub, Tobias, and Andreas Heinemann. "Security for Ubiquitous Computing." In Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises, edited by Max Mühlhäuser and Iryna Gurevych, 337-362. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-832-1.ch015

Export Reference

Mendeley
Favorite

Abstract

Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.