Securing the Rover System

dc.contributor.authorAgarwal, Sulabhen_US
dc.contributor.authorKamel, Kevinen_US
dc.date.accessioned2004-05-31T23:19:36Z
dc.date.available2004-05-31T23:19:36Z
dc.date.created2002-06en_US
dc.date.issued2002-08-01en_US
dc.description.abstractRover is a system designed to provide location-based services to users in a wireless environment. Rover has the potential to be deployed in a variety of commercial scenarios as well as for emergency relief, disaster management, etc. Given that Rover may be used in mission critical situations it's integrity is imperative. In this paper the Rover architecture is studied to identify its security vulnerabilities. A design is proposed to secure Rover and details of its implementation are also presented. Also UMIACS-TR-2002-58en_US
dc.format.extent2731463 bytes
dc.format.mimetypeapplication/postscript
dc.identifier.urihttp://hdl.handle.net/1903/1210
dc.language.isoen_US
dc.relation.isAvailableAtDigital Repository at the University of Marylanden_US
dc.relation.isAvailableAtUniversity of Maryland (College Park, Md.)en_US
dc.relation.isAvailableAtTech Reports in Computer Science and Engineeringen_US
dc.relation.isAvailableAtUMIACS Technical Reportsen_US
dc.relation.ispartofseriesUM Computer Science Department; CS-TR-4378en_US
dc.relation.ispartofseriesUMIACS; UMIACS-TR-2002-58en_US
dc.titleSecuring the Rover Systemen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
CS-TR-4378.ps
Size:
2.6 MB
Format:
Postscript Files
Loading...
Thumbnail Image
Name:
CS-TR-4378.pdf
Size:
194.12 KB
Format:
Adobe Portable Document Format
Description:
Auto-generated copy of CS-TR-4378.ps