Nomadic Computing – Security assessment of remote access to workplace systems

Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing.In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered.For this purpose a futuristic scenario has been used as a method to identify challenges within nomadic computing. After looking at the state of the art of wireless communication and security techniques, evaluating the focused techniques and looking at future trends, some preliminary conclusions could be made.A model of technology uptake has been used. The main concept of the model is to show that the uptake is depending on a co-evolution between different parts and not only the technique…

Contents

1 INTRODUCTION
1.1 GUIDELINES FOR THE READER
1.2 INTRODUCTORY SCENARIO
1.3 SCENARIO DISCUSSION
2 METHOD
2.1 INVESTIGATION FOCUS AND PURPOSE
2.2 METHODOLOGY DISCUSSION
2.3 INVESTIGATION MODEL
2.4 STRUCTURE OF INVESTIGATION
3 CHALLENGES IN NOMADIC COMPUTING
3.1 CHALLENGES IN NOMADIC COMPUTING DERIVED FROM THE SCENARIO
3.2 ASSESSMENT OF CHALLENGES8
3.3 TECHNICAL FOCUS
4 STATE OF THE ART OF WIRELESS COMMUNICATION
4.1 INTRODUCTION TO WIRELESS COMMUNICATION
4.2 SECURITY THREATS
4.3 SECURITY PROTECTION MECHANISMS
5 EVALUATION OF THE PROPOSED TECHNIQUES
5.1 CONCEPTUAL MODELS OF REMOTE ACCESS
5.2 ASSESSMENT OF THE TECHNIQUES USED IN TENTATIVE SOLUTIONS
6 FUTURE TRENDS FOR NOMADIC COMPUTING AND SECURITY
6.1 NOMADS
6.2 SECURITY TODAY
6.3 SECURITY TRENDS
6.4 FINAL DISCUSSION OF THE FUTURE SCENARIO PROBLEMS
7 SUMMARY AND CONCLUSIONS
7.1 NOMADIC COMPUTING AND REMOTE ACCESS
7.2 THE TECHNIQUES
7.3 CONCLUSIONS
8 REFERENCES
8.1 LITERATURE
8.2 PROCEEDINGS AND ARTICLES
8.3 WHITE PAPERS AND REPORTS
GLOSSARY
APPENDIX A

Author: Johanna Karlsson

Source: Blekinge Institute of Technology

Reference URL 1: Visit Now

Leave a Comment