000 04669nam a22005535i 4500
001 978-0-387-88775-3
003 DE-He213
005 20251006084429.0
007 cr nn 008mamaa
008 100301s2009 xxu| s |||| 0|eng d
020 _a9780387887753
020 _a99780387887753
024 7 _a10.1007/978-0-387-88775-3
_2doi
100 1 _aKokolakis, Spyros.
_eeditor.
245 1 0 _aSecurity and Dependability for Ambient Intelligence
_h[electronic resource] /
_cedited by Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis.
264 1 _aBoston, MA :
_bSpringer US,
_c2009.
300 _bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v45
505 0 _aFoundations of Security and Dependability -- Security and Dependability Engineering -- Security Patterns and A Methodology to Apply them -- Introduction: The SERENITY vision -- The SERENITY Security and Dependability Artefacts -- Specification of Security and Dependability Properties -- Representation of Security and Dependability Solutions -- Security and Dependability Solutions for Web Services and Workflows -- Security and Dependability Solutions for Networks and Devices -- Developing SERENITY Aware Applications and S&D solutions -- SERENITY Aware Development of Security and Dependability Solutions -- Verification of S&D Solutions for Network Communications and Devices -- SERENITY Aware System Development Process -- Runtime Support for Security and Dependability -- The SERENITY Runtime Framework -- Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime -- The SERENITY Runtime Monitoring Framework -- Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework -- Dealing with Security and Dependability at Organisational and Legal Levels -- Organisational Pattern Driven Recovery Mechanisms -- Legal Issues of Ambient Intelligence in the SERENITY Project -- Experiences and Future Directions -- SERENITY in e-Business and Smart Item Scenarios -- Realising the Potential of Serenity in Emerging AmI Ecosystems:Implications and Challenges -- Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving -- SERENITY in Air Traffic Management -- Future Directions.
520 _aSecurity and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms. An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems. Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.
650 0 _aCOMPUTER SCIENCE.
650 0 _aCOMPUTER NETWORK ARCHITECTURES.
650 0 _aCOMPUTER COMMUNICATION NETWORKS.
650 0 _aSOFTWARE ENGINEERING.
650 0 _aOPERATING SYSTEMS (COMPUTERS).
650 0 _aDATA PROTECTION.
650 0 _aINFORMATION SYSTEMS.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS.
650 2 4 _aINFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET).
650 2 4 _aSOFTWARE ENGINEERING.
650 2 4 _aOPERATING SYSTEMS.
650 2 4 _aCOMPUTER COMMUNICATION NETWORKS.
650 2 4 _aSYSTEMS AND DATA SECURITY.
700 1 _aGómez, Antonio Maña.
_eeditor.
700 1 _aSpanoudakis, George.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387887746
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v45
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-88775-3
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c59404
_d59404