메뉴 건너뛰기




Volumn , Issue , 2006, Pages 244-270

Security engineering for ambient intelligence: A manifesto

Author keywords

[No Author keywords available]

Indexed keywords


EID: 37249038828     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-147-6.ch011     Document Type: Chapter
Times cited : (12)

References (39)
  • 2
    • 0041876237 scopus 로고    scopus 로고
    • Software infrastructure and design challenges for ubiquitous computing applications
    • December
    • Banavar, G., & Bernstein, A. (2002, December). Software infrastructure and design challenges for ubiquitous computing applications. Communications of the ACM, 45(12), 92-6.
    • (2002) Communications of the ACM , vol.45 , Issue.12 , pp. 92-96
    • Banavar, G.1    Bernstein, A.2
  • 8
    • 84944048132 scopus 로고    scopus 로고
    • The ponder policy specification language
    • LNCS. Berlin Heidelberg: Springer-Verlag
    • Damianou, N., Dulay, N., Lupu, E., & Sloman, M. (2001). The ponder policy specification language. POLICY 2001 (pp. 18-38). LNCS. Berlin Heidelberg: Springer-Verlag.
    • (2001) POLICY 2001 , pp. 18-38
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 9
    • 34247327703 scopus 로고    scopus 로고
    • Towards self-protecting ubiquitous systems monitoring trust-based interactions
    • English, C., Terzis, S., & Nixon, P. (2004). Towards self-protecting ubiquitous systems monitoring trust-based interactions. Proceedings of UbiSys ' 04.
    • (2004) Proceedings of UbiSys ' 04
    • English, C.1    Terzis, S.2    Nixon, P.3
  • 14
    • 84869126525 scopus 로고
    • Toward principles for the design of ontologies used for knowledge sharing
    • In N. Guarino & R. Poli (Eds.), Dordrecht, The Netherlands: Kluwer Academic Publishers
    • Gruber, T. R. (1993). Toward principles for the design of ontologies used for knowledge sharing. In N. Guarino & R. Poli (Eds.), Formal ontology in conceptual analysis and knowledge representation. Dordrecht, The Netherlands: Kluwer Academic Publishers.
    • (1993) Formal Ontology In Conceptual Analysis and Knowledge Representation
    • Gruber, T.R.1
  • 15
    • 35048850964 scopus 로고    scopus 로고
    • IBM's Security Strategy team, An IBM White Paper. Retrieved from
    • IBM's Security Strategy team (2004). Introduction to business security patterns. An IBM White Paper. Retrieved from http://www-3.ibm.com/security/patterns/intro.pdf
    • (2004) Introduction to Business Security Patterns
  • 22
    • 33747127813 scopus 로고    scopus 로고
    • Run-time monitoring of requirements for systems composed of Web-services: Initial implementation and evaluation experience
    • (ICWS 2005)
    • Mahbub, K., & Spanoudakis, G. (2005). Run-time monitoring of requirements for systems composed of Web-services: Initial implementation and evaluation experience. The 3rd International IEEE Conference on Web Services (ICWS 2005).
    • (2005) The 3rd International IEEE Conference On Web Services
    • Mahbub, K.1    Spanoudakis, G.2
  • 25
    • 84899400257 scopus 로고    scopus 로고
    • Object Management Group. (OMG). Common Object Request Broker Architecture (CORBA) Core Specification. Retrieved July 2004, from
    • Object Management Group. (OMG). Common Object Request Broker Architecture (CORBA) Core Specification. Retrieved July 2004, from http://www.omg.org
  • 33
    • 0032202421 scopus 로고    scopus 로고
    • An effective model for composition of secure systems
    • November
    • Shi, Q., & Zhang, N. (1998, November). An effective model for composition of secure systems. Journal of Systems and Software, 43(3), 233-44.
    • (1998) Journal of Systems and Software , vol.43 , Issue.3 , pp. 233-244
    • Shi, Q.1    Zhang, N.2
  • 34
    • 33745451350 scopus 로고    scopus 로고
    • Monitoring algorithms for metric temporal logic specifications
    • Retrieved January 2005, from
    • Thati, P., & Rosu, G. (2004). Monitoring algorithms for metric temporal logic specifications. Proceedings of the 4th Workshop on Runtime Verification (RV '04). Retrieved January 2005, from http://ase.arc.nasa.gov/rv2004/
    • (2004) Proceedings of the 4th Workshop On Runtime Verification (RV '04)
    • Thati, P.1    Rosu, G.2
  • 35
    • 0035780469 scopus 로고    scopus 로고
    • Embedding security practices in contemporary information systems development approaches
    • Tryfonas, T., Kiountouzis, E., & Poulymenakou, A. (2001). Embedding security practices in contemporary information systems development approaches. Information Management & Computer Security, 9(4), 183-197.
    • (2001) Information Management & Computer Security , vol.9 , Issue.4 , pp. 183-197
    • Tryfonas, T.1    Kiountouzis, E.2    Poulymenakou, A.3
  • 38
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • February
    • Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004, February). Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11(1), 38-47.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.