Die Informatisierung Des Alltags
DOI: 10.1007/978-3-540-71455-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Sicherheit im Ubiquitous Computing: Schutz durch Gebote?

Abstract: Kurzfassung. Solange man unter Sicherheit vor allem Zugriffskontrolle versteht, bestehen wenig Chancen, ein angemessenes Sicherheitsniveau für Systeme des Ubiquitous Computing zu erreichen. Solche Systeme sind vor allem durch die spontane Interaktion mobiler und kontextsensitiver Komponenten geprägt. Durch ihre Einführung werden sich die Angriffe auf Computersysteme verändern, denn es ist offensichtlich, dass Fehler und damit eine der wichtigsten Quellen für Schwachstellen in IT-Systemen bereits heute rasant z… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…As discussed for finance products in [30], there are no methods or tools available which assure a technically correct proposed use of data in the sense of classical IT security. Methods following a classical IT security approach for internet-based IT infrastructures means the adherence to protection goals ( [31], [32], [33]) that can result from laws, contracts, service usage conditions, etc. Available security mechanisms or services assume that a data object has to be protected from unauthorized access.…”
Section: Compliance In Business and Rescue Processesmentioning
confidence: 99%
“…As discussed for finance products in [30], there are no methods or tools available which assure a technically correct proposed use of data in the sense of classical IT security. Methods following a classical IT security approach for internet-based IT infrastructures means the adherence to protection goals ( [31], [32], [33]) that can result from laws, contracts, service usage conditions, etc. Available security mechanisms or services assume that a data object has to be protected from unauthorized access.…”
Section: Compliance In Business and Rescue Processesmentioning
confidence: 99%