Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/6687

Registo completo
Campo DCValorIdioma
dc.contributor.authorMagalhães, Paulo Sérgio Tenreiro-
dc.contributor.authorSantos, Henrique Dinis dos-
dc.contributor.authorSantos, Leonel Duarte dos-
dc.contributor.authorRevett, Kenneth-
dc.contributor.authorNunes, Paulo Viegas-
dc.date.accessioned2007-07-16T15:43:40Z-
dc.date.available2007-07-16T15:43:40Z-
dc.date.issued2007-07-
dc.identifier.citationEUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 6, Shrivenham, UK, 2007 – “ECIW 2007 : proceedings”. [S.l.] : ACI Press, [2007]. ISBN 978-1-905305-49-0. p. 273-279.eng
dc.identifier.isbn978-1-905305-49-0-
dc.identifier.urihttps://hdl.handle.net/1822/6687-
dc.description.abstractThe information agent has requirements in the Information Technology (IT) age that are in everything comparable to those of one hundred years ago. But, despite being similar, they require new forms of implementation due to the evolution of the communication platforms and protocols and to the increase in the amount of information that has to be known, stored, transmitted, and interpreted. Although, in many situations, the information agent will make use of everyday equipment, he will always require levels of trust in the processes that are far beyond those of the everyday citizen. But this cannot imply to carry huge infrastructures that will reveal the agent’s intentions. In extreme situations the information agent is the soldier engaged in military activities in hostile environments. There, above all places, he requires light weight trustable equipment and protocols that can perform those tasks. This work, while making the parallel with the traditional methods, proposes a technological environment able to give answer to the requirements of information agents dealing with the need for a competitive intelligence advantage through the correct use of IT, namely biometrics, alternative authentication processes, Public Key Infrastructures and anti-fishing technologies.eng
dc.language.isoengeng
dc.publisherAcademic Conferences and Publishing International (ACPI)eng
dc.rightsopenAccesseng
dc.subjectSecurity infrastructureeng
dc.subjectWearable securityeng
dc.subjectInformation activitieseng
dc.titleInformation technologies for the information agenteng
dc.typeconferencePapereng
dc.peerreviewedyeseng
oaire.citationStartPage273por
oaire.citationEndPage+por
dc.subject.wosScience & Technologypor
dc.subject.wosSocial Sciencespor
sdum.bookTitleECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITYpor
Aparece nas coleções:DSI - Sociedade da Informação

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
eciw2007.pdfECIW2007225,18 kBAdobe PDFVer/Abrir

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID