Secure interoperation of wireless technologies

Show simple item record

dc.contributor.advisor Olivier, Martin S. en
dc.contributor.postgraduate Croft, Neil John en
dc.date.accessioned 2013-09-07T18:10:07Z
dc.date.available 2004-12-07 en
dc.date.available 2013-09-07T18:10:07Z
dc.date.created 2003-10-09 en
dc.date.issued 2003 en
dc.date.submitted 2004-12-07 en
dc.description Dissertation (MSc (Computer Science))--University of Pretoria, 2003. en
dc.description.abstract Tremendous emphasis has been placed on wireless technologies recently and it is expected that mobile communications will become an even bigger key driver for growth and innovation in the near future. The purpose of this paper is to study the securing, development, integration and implementation of an always on, always available, and accessible from anywhere secure wireless communication environment. Our analysis of the different wireless technologies reveals that a number of obstacles have to be managed before truly transparent wireless public data consumer offering is available. Our concern revolves around the technical development and implementation efforts of integrated wireless technologies enveloped with management processes of change and evolution. Wireless technologies have influenced our daily lives and will undoubtedly continue to play a significant role in the future. This dissertation focuses on the interoperation of wireless technologies, exploring, evaluating and presenting representations of secure, fully integrated wireless environments. The purpose is to find a cost effective, open, viable, sustainable consumer orientated high data speed offering which not only adheres to basic security requirements but surpasses it. By bringing the network to the subscriber we generate an “always-on” and “always-available” solution for data requirements fulfilling an ever increasing human demand for access to resources anywhere, anytime. A background literature of various wireless technologies, techniques and value added services is provided. An approach for the securing of critical content over wireless links in chapter seven provides a basis for access by position concepts presented in chapter eight. This secure approach to location-aware mobile access control is an essential security enhancement in the integration and interoperation models illustrated in chapter nine. These models, appropriately named SWARM 1 and SWARM 2 (System for Wireless and Roaming Mobility), illustrate different approaches to achieving a secure, fully coherent, consumer orientated, wireless data communications environment. en
dc.description.availability unrestricted en
dc.description.department Computer Science en
dc.identifier.citation Croft, N 2003, The Interoperation of Wireless Technologies, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/30167 > en
dc.identifier.upetdurl http://upetd.up.ac.za/thesis/available/etd-12072004-082613/ en
dc.identifier.uri http://hdl.handle.net/2263/30167
dc.language.iso en
dc.publisher University of Pretoria en_ZA
dc.rights © 2003, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria. en
dc.subject Wireless en
dc.subject Integration en
dc.subject Security en
dc.subject Xml en
dc.subject Interoperation en
dc.subject Umts en
dc.subject Location-based services en
dc.subject Wlan en
dc.subject Gprs en
dc.subject Mobile en
dc.subject Gsm en
dc.subject UCTD en_US
dc.title Secure interoperation of wireless technologies en
dc.type Dissertation en


Files in this item

This item appears in the following Collection(s)

Show simple item record