[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Wed, 05 Mar 2003 15:38:54 -0500
Module name: gzz
Changes by: Toni Alatalo <address@hidden> 03/03/05 15:38:53
a little thinking
diff -u gzz/Documentation/misc/antont-wireless_security/data_ubiquity:1.1
--- gzz/Documentation/misc/antont-wireless_security/data_ubiquity:1.1 Wed Mar
5 15:09:01 2003
+++ gzz/Documentation/misc/antont-wireless_security/data_ubiquity Wed Mar
5 15:38:53 2003
@@ -51,10 +51,22 @@
-The wireless transfer protocols do not necessarily guarantee the security of
the communication, e.g. confidentiality or integrity of the data.
+The wireless transfer protocols do not necessarily guarantee the security of
+the communication, e.g. confidentiality or integrity of the data.
-Hence, it may be required that the
+That is but one of the many reasons why security must be considered on
+higher levels as well. Even application layer solutions are commonplace,
+e.g. using cryptographical means to protect data have been integrated in
+mail and chat clients (in tools such as pgp , gpg , silc , ..).
+When considering mobile use, there may be different requirements for the
+application layer software than in conventional stationary use. For example,
+applications used in mobile phones must be cheap in terms of CPU to save
+power and expense. Thus the solutions that have been developed for
+stationary use (more powerful machines) must be additionally evaluated with
+the small devices etc. in mind. Obviously, wireless connections can be used
+for stationary devices as well (e.g. satellite stations are very
+stationary), so there power distinction does not apply.