Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Nomadic Computing: Security assessment of remote access to workplace systems
Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
2003 (English)Independent thesis Advanced level (degree of Master (One Year))Student thesis
Abstract [en]

Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario has been used as a method to identify challenges within nomadic computing. After looking at the state of the art of wireless communication and security techniques, evaluating the focused techniques and looking at future trends, some preliminary conclusions could be made. A model of technology uptake has been used. The main concept of the model is to show that the uptake is depending on a co-evolution between different parts and not only the technique. One conclusion is therefore that the users must have confidence in the technique, but also in the organisation and the organisational use of the technique or else they will not use it. Security is important in order to create this trust and is thus of decisive importance to the technology uptake. Another conclusion is that the three focused techniques; rule-based access, authentication and policy/contract can be used today, but also in the future to increase the security for remote access. Finally, education and user awareness seems to be important in the future, even though the users interact less in the security management.

Place, publisher, year, edition, pages
2003. , p. 40
Keywords [en]
Remote Access, Security, Mobile Device, Wireless Communication
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-4845Local ID: oai:bth.se:arkivex5B7DA6049A4F86E9C1256D7D0034E815OAI: oai:DiVA.org:bth-4845DiVA, id: diva2:832196
Uppsok
Technology
Supervisors
Available from: 2015-04-22 Created: 2003-08-09 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(1688 kB)1727 downloads
File information
File name FULLTEXT01.pdfFile size 1688 kBChecksum SHA-512
a4fb236bfe523114c5f10bc958aec55f4c2742754a059ad75618f19865a7321544bd4983eccc8b92e180511526c01d86f6f8a5c2f419b3f620e514902c239cc0
Type fulltextMimetype application/pdf

By organisation
Department of Software Engineering and Computer Science
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 1727 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 518 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf