|
|
|
|
LEADER |
04748nam a22005775i 4500 |
001 |
978-0-387-88775-3 |
003 |
DE-He213 |
005 |
20151204155000.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387887753
|9 978-0-387-88775-3
|
024 |
7 |
|
|a 10.1007/978-0-387-88775-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security and Dependability for Ambient Intelligence
|h [electronic resource] /
|c edited by Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2009.
|
300 |
|
|
|a IX, 392 p. 80 illus., 30 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 45
|
505 |
0 |
|
|a Foundations of Security and Dependability -- Security and Dependability Engineering -- Security Patterns and A Methodology to Apply them -- Introduction: The SERENITY vision -- The SERENITY Security and Dependability Artefacts -- Specification of Security and Dependability Properties -- Representation of Security and Dependability Solutions -- Security and Dependability Solutions for Web Services and Workflows -- Security and Dependability Solutions for Networks and Devices -- Developing SERENITY Aware Applications and S&D solutions -- SERENITY Aware Development of Security and Dependability Solutions -- Verification of S&D Solutions for Network Communications and Devices -- SERENITY Aware System Development Process -- Runtime Support for Security and Dependability -- The SERENITY Runtime Framework -- Pattern Driven Selection and Configuration of S#x0026;D Mechanisms at Runtime -- The SERENITY Runtime Monitoring Framework -- Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework -- Dealing with Security and Dependability at Organisational and Legal Levels -- Organisational Pattern Driven Recovery Mechanisms -- Legal Issues of Ambient Intelligence in the SERENITY Project -- Experiences and Future Directions -- SERENITY in e-Business and Smart Item Scenarios -- Realising the Potential of Serenity in Emerging AmI Ecosystems:Implications and Challenges -- Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving -- SERENITY in Air Traffic Management -- Future Directions.
|
520 |
|
|
|a Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms. An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems. Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering. .
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Computer security.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Operating Systems.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
700 |
1 |
|
|a Kokolakis, Spyros.
|e editor.
|
700 |
1 |
|
|a Gómez, Antonio Maña.
|e editor.
|
700 |
1 |
|
|a Spanoudakis, George.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387887746
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 45
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-88775-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|