Securing Delay-Tolerant Networks with BPSec / Najlacnejšie knihy
Securing Delay-Tolerant Networks with BPSec

Kód: 35389491

Securing Delay-Tolerant Networks with BPSec

Autor Edward Birrane, Sarah Heiner, Ken McKeever

Securing Delay-Tolerant Networks with BPSec answers the question ?how can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial ... celý popis

165.40


Skladom u dodávateľa
Odosielame za 14 - 18 dní
Pridať medzi želanie

Mohlo by sa vám tiež páčiť

Darujte túto knihu ešte dnes
  1. Objednajte knihu a vyberte Zaslať ako darček.
  2. Obratom obdržíte darovací poukaz na knihu, ktorý môžete ihneď odovzdať obdarovanému.
  3. Knihu zašleme na adresu obdarovaného, o nič sa nestaráte.

Viac informácií

Viac informácií o knihe Securing Delay-Tolerant Networks with BPSec

Nákupom získate 415 bodov

Anotácia knihy

Securing Delay-Tolerant Networks with BPSec answers the question ?how can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today.? This book is decomposed into three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in an example case studyThe first section presents the challenges of securing disrupted networks. The section starts with a distinction between cryptography as a discipline and the security protocols used to exchange cryptographic materials. This is followed by a discussion of the unique stressors found in DTNs and how these stressing conditions break many of the protocols used to secure the terrestrial Internet. Finally, this section discusses the characteristics of a security architecture for DTNs and the unique security considerations.The second section focuses on the history and development of the BPSec protocol itself. Next, the mechanisms used to represent cryptographic materials in bundles are discussed along with rules used for the processing of BPSec materials. This section concludes with a discussion of two characteristics of the BPSec protocol: security context definitions and out-of-band policy configurations.The third section discusses pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. This section discusses how BPSec interacts with both DTN and non-DTN protocols and how the protocol can be extended to encounter a variety of methods for defining and communicating cryptographic material. This is followed by a series of use cases illustrating the function of BPSec in a network and a tutorial on how to achieve important security outcomes with a combination of security protocols, BPSec included. The section concludes with both a discussion of security concerns and a case study for securing cislunar communications.

Parametre knihy

Zaradenie knihy Knihy po anglicky Computing & information technology Computer networking & communications

165.40

Obľúbené z iného súdka



Osobný odber Bratislava a 2642 dalších

Copyright ©2008-24 najlacnejsie-knihy.sk Všetky práva vyhradenéSúkromieCookies


Môj účet: Prihlásiť sa
Všetky knihy sveta na jednom mieste. Navyše za skvelé ceny.

Nákupný košík ( prázdny )

Vyzdvihnutie v Zásielkovni
zadarmo nad 59,99 €.

Nachádzate sa: