AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility (Anglais) Relié – 9 septembre 2005
Rentrée scolaire 2017 : découvrez notre boutique de livres, fournitures, cartables, ordinateurs, vêtements ... Voir plus.
|Neuf à partir de||Occasion à partir de|
- Choisissez parmi 17 000 points de collecte en France
- Les membres du programme Amazon Prime bénéficient de livraison gratuites illimitées
- Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
- Sélectionnez cette adresse lors de votre commande
Description du produit
Revue de presse
Présentation de l'éditeur
AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations.
AAA and Network Security for Mobile Access:
- Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment.
- Discusses public key infrastructures and provides practical tips on certificates management.
- Introduces Diameter, a state–of–the–art AAA protocol designed to meet today s reliability, security and robustness requirements, and examines Diameter–Mobile IP interactions.
- Explains RADIUS (Remote Authentication Dial–In User Services) and its latest extensions.
- Details EAP (Extensible Authentication Protocol) in–depth, giving a protocol overview, and covering EAP–XXX authentication methods as well as use of EAP in 802 networks.
- Describes IP mobility protocols including IP level mobility management, its security and optimizations, and latest IETF seamless mobility protocols.
- Includes a chapter describing the details of Mobile IP and AAA interaction, illustrating Diameter Mobile IP applications and the process used in CDMA2000.
- Contains a section on security and AAA issues to support roaming, discussing a variety of options for operator co–existence, including an overview of Liberty Alliance.
This text will provide researchers in academia and industry, network security engineers, managers, developers and planners, as well as graduate students, with an accessible explanation of the standards fundamental to secure mobile access.
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.
Détails sur le produit
Si vous vendez ce produit, souhaitez-vous suggérer des mises à jour par l'intermédiaire du support vendeur ?
Commentaires client les plus utiles sur Amazon.com
I wish this subject had been covered in greater details, with possibly greater attention given to applications & usage in IMS networks, which is in practice where DIAMETER is often found.
Authentication is a three way street. Is the device being used really the correct device to receive the service being requested? And is the network being accessed really the network you want to be on? The third type of authentication is on a message level. Is the message itself legit, or did someone, somehow get in the middle and send a bogus message?
Authorization is rather like the old 'need to know' aspect of security. Is the salesman out in the field that's calling in really authorized to get employee or financial information?
Accounting includes making sure that the client is billed the correct amount of time, but also includes such things as system usage analysis to help define capacity planning.
Each of these subjects is exhaustively treated in this book. Further they are handled with a casual writing style that makes the book more enjoyable to read than most. Well, maybe enjoyable isn't exactly the right word -- how about making it possible to get through it without falling asleep.