Guyz this one is great .Its from International Conference on Systemics, Cybernetics and Informatics. I like this hope so you also like it
Abstract:
Mobility is about individual and on-demand connection. It's about getting the right information at the right time and in the right place. In the end, mobility has the power to transform the way we go beyond the Internet.Delivering mobility isn't just about wireless devices and networks. It's really about connecting people connecting them with one another, with their work, their homes and their play - and supporting their experience regardless of which technology is used. So that the end result is a seamless customer experience with all the old boundaries removed.
The Wireless Application Protocol (WAP) has been proposed as a better way to achieve the mobility.WAP is a specification for a set of communication protocols designed to allow and standardize ways for wireless devices to get information from networks and display it in their browsers. WAP helps to define servers, called gateways, that mediate between wired and wireless networks, and provide value-added services to wireless networks. Using WAP, you can communicate with any operating system. Global enterprises are automating the distribution and sharing of data, information and applications in real time. This necessitates a strategic plan that assures the privacy, confidentiality, integrity and availability of their
information systems, supporting infrastructures and other intellectual assets. In the transition from e-commerce to the digital economy the major roadblock, lack of trust, must be removed. So the issue of data security is given the top concern when planning comprehensive information assurance strategy.
Security is both an enabling and disabling technology. Its purpose is to enable communication and transactions to take place in a secure environment without Fear of compromise, while at the same time disabling non-legitimate activities and access to information and facilities. Non-legitimate activities include eavesdropping, pretending to be another party (also known as impostering or spoofing), or tampering with data during transmission. In general these activities are either unacceptable or illegal outside of the digital environment, so security simply helps to enforce the status quo in that sense.
Introduction
There is a common perception that wireless environments are inherently less secure than wired
environments. Reports of phone masquerading and phone call tapping in mobile wireless environments have led many to believe that this is not an environment conducive for e-commerce. While this was certainly true in the past, the wireless industry has been working hard at providing security protections strong enough for real mobile-device based e-commerce
Concepts:
Familiarity with some concepts relating to digital communications and to security are required in order to understand the points made later in this paper, and the place within the communications process of the existing security solutions.
What Security is About
We are going to begin the investigation of the topic of security with a discussion of what security is about and why it matters. In this section we will investigate:
1. The importance of security in mobile applications
2.The role of security in protecting data and systems
3. The basic issues which security solutions of all types need to address
The Role of Security
Security is both an enabling and disabling technology. Its purpose is to enable communications and transactions to take place in a secure environment without fear of compromise, while at the same time disabling non-legitimate activities and access to information and facilities. Non-legitimate activities include eaves dropping,pretending to be another party (also known as impostering or spoofing), or tampering with data during transmission. In general these activities are either unacceptable or illegal outside of the digital environment, so security simply helps to enforce the status quo in that sense.
These basic issues are:
Authentication – being able to validate that the
other party participating in a transaction is who
the party claims to be, or a legitimate
representative of that party
*Confidentiality – being able to ensure that the content and meaning of communications between two parties do not become known to third parties
* Integrity – being able to ensure that messages received are genuine and have not been tampered with or otherwise compromised
* Authorization – being able to ascertain that a
party wanting to perform some action is entitled to perform that action within the given context
*Non-repudiation – being able to ensure that once a party has voluntarily committed to anaction it is not possible.
Next WAP Architecture
Abstract:
Mobility is about individual and on-demand connection. It's about getting the right information at the right time and in the right place. In the end, mobility has the power to transform the way we go beyond the Internet.Delivering mobility isn't just about wireless devices and networks. It's really about connecting people connecting them with one another, with their work, their homes and their play - and supporting their experience regardless of which technology is used. So that the end result is a seamless customer experience with all the old boundaries removed.
The Wireless Application Protocol (WAP) has been proposed as a better way to achieve the mobility.WAP is a specification for a set of communication protocols designed to allow and standardize ways for wireless devices to get information from networks and display it in their browsers. WAP helps to define servers, called gateways, that mediate between wired and wireless networks, and provide value-added services to wireless networks. Using WAP, you can communicate with any operating system. Global enterprises are automating the distribution and sharing of data, information and applications in real time. This necessitates a strategic plan that assures the privacy, confidentiality, integrity and availability of their
information systems, supporting infrastructures and other intellectual assets. In the transition from e-commerce to the digital economy the major roadblock, lack of trust, must be removed. So the issue of data security is given the top concern when planning comprehensive information assurance strategy.
Security is both an enabling and disabling technology. Its purpose is to enable communication and transactions to take place in a secure environment without Fear of compromise, while at the same time disabling non-legitimate activities and access to information and facilities. Non-legitimate activities include eavesdropping, pretending to be another party (also known as impostering or spoofing), or tampering with data during transmission. In general these activities are either unacceptable or illegal outside of the digital environment, so security simply helps to enforce the status quo in that sense.
Introduction
There is a common perception that wireless environments are inherently less secure than wired
environments. Reports of phone masquerading and phone call tapping in mobile wireless environments have led many to believe that this is not an environment conducive for e-commerce. While this was certainly true in the past, the wireless industry has been working hard at providing security protections strong enough for real mobile-device based e-commerce
Concepts:
Familiarity with some concepts relating to digital communications and to security are required in order to understand the points made later in this paper, and the place within the communications process of the existing security solutions.
What Security is About
We are going to begin the investigation of the topic of security with a discussion of what security is about and why it matters. In this section we will investigate:
1. The importance of security in mobile applications
2.The role of security in protecting data and systems
3. The basic issues which security solutions of all types need to address
The Role of Security
Security is both an enabling and disabling technology. Its purpose is to enable communications and transactions to take place in a secure environment without fear of compromise, while at the same time disabling non-legitimate activities and access to information and facilities. Non-legitimate activities include eaves dropping,pretending to be another party (also known as impostering or spoofing), or tampering with data during transmission. In general these activities are either unacceptable or illegal outside of the digital environment, so security simply helps to enforce the status quo in that sense.
These basic issues are:
Authentication – being able to validate that the
other party participating in a transaction is who
the party claims to be, or a legitimate
representative of that party
*Confidentiality – being able to ensure that the content and meaning of communications between two parties do not become known to third parties
* Integrity – being able to ensure that messages received are genuine and have not been tampered with or otherwise compromised
* Authorization – being able to ascertain that a
party wanting to perform some action is entitled to perform that action within the given context
*Non-repudiation – being able to ensure that once a party has voluntarily committed to anaction it is not possible.
Next WAP Architecture
0 comments:
Post a Comment
Thanks for your Valuable comment