| 000 | 04669nam a22005535i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-88775-3 | ||
| 003 | DE-He213 | ||
| 005 | 20251006084429.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2009 xxu| s |||| 0|eng d | ||
| 020 | _a9780387887753 | ||
| 020 | _a99780387887753 | ||
| 024 | 7 |
_a10.1007/978-0-387-88775-3 _2doi |
|
| 100 | 1 |
_aKokolakis, Spyros. _eeditor. |
|
| 245 | 1 | 0 |
_aSecurity and Dependability for Ambient Intelligence _h[electronic resource] / _cedited by Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2009. |
|
| 300 | _bonline resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v45 |
|
| 505 | 0 | _aFoundations of Security and Dependability -- Security and Dependability Engineering -- Security Patterns and A Methodology to Apply them -- Introduction: The SERENITY vision -- The SERENITY Security and Dependability Artefacts -- Specification of Security and Dependability Properties -- Representation of Security and Dependability Solutions -- Security and Dependability Solutions for Web Services and Workflows -- Security and Dependability Solutions for Networks and Devices -- Developing SERENITY Aware Applications and S&D solutions -- SERENITY Aware Development of Security and Dependability Solutions -- Verification of S&D Solutions for Network Communications and Devices -- SERENITY Aware System Development Process -- Runtime Support for Security and Dependability -- The SERENITY Runtime Framework -- Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime -- The SERENITY Runtime Monitoring Framework -- Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework -- Dealing with Security and Dependability at Organisational and Legal Levels -- Organisational Pattern Driven Recovery Mechanisms -- Legal Issues of Ambient Intelligence in the SERENITY Project -- Experiences and Future Directions -- SERENITY in e-Business and Smart Item Scenarios -- Realising the Potential of Serenity in Emerging AmI Ecosystems:Implications and Challenges -- Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving -- SERENITY in Air Traffic Management -- Future Directions. | |
| 520 | _aSecurity and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms. An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems. Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aCOMPUTER NETWORK ARCHITECTURES. | |
| 650 | 0 | _aCOMPUTER COMMUNICATION NETWORKS. | |
| 650 | 0 | _aSOFTWARE ENGINEERING. | |
| 650 | 0 | _aOPERATING SYSTEMS (COMPUTERS). | |
| 650 | 0 | _aDATA PROTECTION. | |
| 650 | 0 | _aINFORMATION SYSTEMS. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aINFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET). |
| 650 | 2 | 4 | _aSOFTWARE ENGINEERING. |
| 650 | 2 | 4 | _aOPERATING SYSTEMS. |
| 650 | 2 | 4 | _aCOMPUTER COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aSYSTEMS AND DATA SECURITY. |
| 700 | 1 |
_aGómez, Antonio Maña. _eeditor. |
|
| 700 | 1 |
_aSpanoudakis, George. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387887746 |
| 830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v45 |
|
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-0-387-88775-3 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c59404 _d59404 |
||