Pervasive business infrastructure : the network technologies, routing and security issues

Varuna Godara, Varuna Godara

    Research output: Chapter in Book / Conference PaperChapter

    Abstract

    ![CDATA[The need for more and more flexibility (in terms of time and location) in business operations, context-based services, decentralization of business processes, and information processing and innovative services has introduced new ubiquitous environments, sensing technologies, and pervasive devices. This new category of devices, sensors, and ubiqitous environments, has the capabilities to observe the users all the time using sensors; provide timely information to service providers using communication channels; and offer accurate services to users anywhere and anytime through tiny mobile terminals. This chapter provides the users of the pervasive business technologies an overview of the basic infrastructure and protocols used to form these ubiquitous wireless environments and provide context-based comfort, while taking care of confidentiality, secrecy, integrity, and authenticity. Along with an introduction to the markup languages, protocols, and security threats, the chapter concludes with the discussion of a range of common biometric, cryptographic, and routing solutions.]]
    Original languageEnglish
    Title of host publicationRisk Assessment and Management in Pervasive Computing : Operational, Legal, Ethical, and Financial Perspectives
    Place of PublicationU.S.A
    PublisherInformation Age Reference
    Pages20-39
    Number of pages20
    ISBN (Print)9781605662206
    Publication statusPublished - 2009

    Keywords

    • electronic commerce
    • computer security
    • mobile computing
    • ubiquitous computing
    • wireless communication systems

    Fingerprint

    Dive into the research topics of 'Pervasive business infrastructure : the network technologies, routing and security issues'. Together they form a unique fingerprint.

    Cite this