Back to Results
First PageMeta Content
Computer security / Wireless security / Network security / Wireless access point / Antivirus software / Nmap / Wi-Fi / Computer network / Computer virus / Computer network security / Software / Computing


Securing WiFi Nomads: The Case for Quarantine, Examination, and Decontamination Kevin Eustice†
Add to Reading List

Document Date: 2003-10-29 13:29:38


Open Document

File Size: 46,99 KB

Share Result on Facebook

City

El Segundo / Baltimore / New York / Washington / DC / Los Angeles / /

Company

The Aerospace Corporation / Fixed Broadband Wireless Access Systems / OpenGroup / Computer-Communication Networks / MOTIVATION Wireless / Norton / 11Ghz Metropolitan Area Networks / Metropolitan Area Networks / Microsoft / The Open Group / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

TCP port / Advanced Systems Research Computer Science Department University of California / University of Maryland / /

IndustryTerm

framework that allows proactive device / Client devices / anti-virus software / wireless world / dozen wireless clients / mobile communications / client software / intrusion detection systems / networked devices / wireless network card / online sources / deployed infrastructure / wireless population / software updates / secure on-demand routing protocol / trusted computing architecture / wireless service / content distribution networks / wireless access points / real-time constraints / food / wireless access point / mobile computing / remote services / wireless environments / installed software / wireless device / wireless gateway / computing / local quarantined devices / wireless infrastructure / wireless security / configured software / detection systems / wireless client devices / local devices / web caching / vulnerable device / update software/firmware versions / benign devices / wireless users / wireless network / configuration analysis tools / easy software maintenance / ubiquitous networking / software versions / wireless network cards / required software / dependent applications / malicious software / ubiquitous Internet / wireless networks / wireless services / update management software / wireless computing / appropriate network / ad hoc networks / http /

OperatingSystem

UNIX / UNIX-like / Microsoft Windows / Linux / /

Organization

Advanced Systems Research Computer Science Department University / University of Maryland / Trust for Ubiquitous Computing / IDG News Service / Trusted Computing Platform Alliance / IPsec / University of California / Los Angeles / /

Person

Phillip A. Porras / Peter G. Neumann / Peter Reiher / Geoff Kuenning / Nam Nguyen / Steven R. Snapp / Gerald Popek / Shane Markstrum / Kevin Eustice / Leonard Kleinrock / /

Position

manager / both systems / General / device and security manager / Farmer / manager / security manager / local security manager / package inspector / local RedHat Package Manager / /

Product

Neumann1999 / /

ProvinceOrState

New York / California / Maryland / /

Technology

Linux / secure on-demand routing protocol / encryption / wireless access / wireless device / wireless technologies / Bluetooth / IPsec-based encryption / peer-to-peer / wireless devices / UNIX / Operating Systems / anti-virus software / public key / DNS / reverse DNS lookup / firewall / Mobile Computing / file sharing / Caching / local router / /

URL

http /

SocialTag