메뉴 건너뛰기




Volumn 5283 LNCS, Issue , 2008, Pages 349-363

Security provisioning in pervasive environments using multi-objective optimization

Author keywords

Multi objective optimization; Pervasive computing; Security

Indexed keywords

CONSTRAINED OPTIMIZATION; MULTIOBJECTIVE OPTIMIZATION; SECURITY OF DATA; SECURITY SYSTEMS; UBIQUITOUS COMPUTING;

EID: 57049173095     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88313-5_23     Document Type: Conference Paper
Times cited : (3)

References (12)
  • 1
    • 33847058446 scopus 로고    scopus 로고
    • Judd, G., Steenkiste, P.: Providing Contextual Information to Pervasive Computing Applications. In: PerCom 2003, pp. 133-142 (2003)
    • Judd, G., Steenkiste, P.: Providing Contextual Information to Pervasive Computing Applications. In: PerCom 2003, pp. 133-142 (2003)
  • 2
    • 2942623979 scopus 로고    scopus 로고
    • Mostéfaoui, G.K., Brézillon, P.: Modeling Context-Based Security Policies with Contextual Graphs. In: PerCom 2004, pp. 28-32 (2004)
    • Mostéfaoui, G.K., Brézillon, P.: Modeling Context-Based Security Policies with Contextual Graphs. In: PerCom 2004, pp. 28-32 (2004)
  • 4
    • 24644520728 scopus 로고    scopus 로고
    • Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, 2609, pp. 1-15. Springer, Heidelberg (2003)
    • Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1-15. Springer, Heidelberg (2003)
  • 5
    • 17144408406 scopus 로고    scopus 로고
    • Balancing Security Against Performance in Wireless Ad Hoc' and Sensor Networks
    • Chigan, C., Ye, Y., Li, L.: Balancing Security Against Performance in Wireless Ad Hoc' and Sensor Networks. In: VTC 2004, vol. 7, pp. 4735-4739 (2004)
    • (2004) VTC , vol.7 , pp. 4735-4739
    • Chigan, C.1    Ye, Y.2    Li, L.3
  • 6
    • 33646812912 scopus 로고    scopus 로고
    • Ranganathan, A., Al-Muhtadi, J., Biehl, J., Ziebart, B., Campbell, R., Bailey, B.: Towards a Pervasive Computing Benchmark. In: PerCom 2005, pp. 194-198 (2005)
    • Ranganathan, A., Al-Muhtadi, J., Biehl, J., Ziebart, B., Campbell, R., Bailey, B.: Towards a Pervasive Computing Benchmark. In: PerCom 2005, pp. 194-198 (2005)
  • 7
    • 57049099196 scopus 로고    scopus 로고
    • Bohn, J., Gärtner, F.: H.Vogt: Dependability Issues in Pervasive Computing in a Healthcare Environment. In: SPC 2003, pp. 53 70 (2003)
    • Bohn, J., Gärtner, F.: H.Vogt: Dependability Issues in Pervasive Computing in a Healthcare Environment. In:" SPC 2003, pp. 53 70 (2003)
  • 9
    • 35549000167 scopus 로고    scopus 로고
    • Sanchez, C., Gruenwald, L., Sanchez, M.: A Monte Carlo Framework to Evaluate Context Based Security Policies in Pervasive Mobile Environments. In: MobiDE 2007, pp. 41-48 (2007)
    • Sanchez, C., Gruenwald, L., Sanchez, M.: A Monte Carlo Framework to Evaluate Context Based Security Policies in Pervasive Mobile Environments. In: MobiDE 2007, pp. 41-48 (2007)
  • 10
    • 0036036577 scopus 로고    scopus 로고
    • Security Attribute Evaluation Method: A Cost-benefit Approach
    • Butler, S.A.: Security Attribute Evaluation Method: A Cost-benefit Approach. In: ICSE 2002, pp. 232-240 (2002)
    • (2002) ICSE 2002 , pp. 232-240
    • Butler, S.A.1
  • 11
    • 0005330416 scopus 로고    scopus 로고
    • Multi-attribute Risk Assessment
    • Butler, S.A., Fischbeck, P.: Multi-attribute Risk Assessment. In: SREIS 2002 (2002)
    • (2002) SREIS
    • Butler, S.A.1    Fischbeck, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.