메뉴 건너뛰기




Volumn , Issue , 2008, Pages 9-14

Applying component-based design to self-protection of ubiquitous systems

Author keywords

Design; Security

Indexed keywords

COMPONENT BASED DESIGN; COMPONENT BASED SOFTWARE; CONTROL LOOP; DIFFERENT MECHANISMS; DYNAMIC CHARACTER; INTEGRATED SOLUTIONS; PERVASIVE SYSTEMS; PROTECTION MECHANISMS; SECURITY; SECURITY REQUIREMENTS; SECURITY SPACE; UBIQUITOUS ENVIRONMENTS; UBIQUITOUS SYSTEMS; USER INTERVENTION;

EID: 70249123137     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1387229.1387233     Document Type: Conference Paper
Times cited : (12)

References (32)
  • 2
    • 84869618692 scopus 로고    scopus 로고
    • IST AMIGO project
    • IST AMIGO project. http://www.hitech-projects.com/euprojects/amigo/.
  • 3
    • 84869628158 scopus 로고    scopus 로고
    • IST ANA project
    • IST ANA project. http://www.ana-project.org/.
  • 4
    • 84869630059 scopus 로고    scopus 로고
    • IST E2R II project
    • IST E2R II project, http://e2r2.motlabs.com/.
  • 5
    • 84869618701 scopus 로고    scopus 로고
    • IST SELFMAN project
    • IST SELFMAN project. http://www.ist-selfman.org/wiki/index.php/ SELFMANProject.
  • 8
    • 33748970808 scopus 로고    scopus 로고
    • E. Bruneton, T. Coupaye, M. Leclercq, V. Quéma, and J.-B. Stefani. The Fractal Component Model and its Support in Java. Software - Practice and Experience (SP & E), 36(11-12):1257-1284, 2006. Special issue on Experiences with Auto-adaptive and Reconfigurable Systems.
    • E. Bruneton, T. Coupaye, M. Leclercq, V. Quéma, and J.-B. Stefani. The Fractal Component Model and its Support in Java. Software - Practice and Experience (SP & E), 36(11-12):1257-1284, 2006. Special issue on "Experiences with Auto-adaptive and Reconfigurable Systems".
  • 9
    • 0037232265 scopus 로고    scopus 로고
    • Security in an Autonomic Computing Environment
    • D. Chess, C. Palmer, and S. White. Security in an Autonomic Computing Environment. IBM Systems Journal, 42(1), 2003.
    • (2003) IBM Systems Journal , vol.42 , Issue.1
    • Chess, D.1    Palmer, C.2    White, S.3
  • 11
    • 33845547636 scopus 로고    scopus 로고
    • S. Dobson, S. Denazis, A. Fernandez, D. Gaiti, F. Massacci, P. Nixon, F. Saffre, N. Schmidt, and F. Zambonelli. A Survey of Autonomic Communication. ACM Transactions on Autonomous and Adaptive Systems, 1(2):223-259, 2006.
    • S. Dobson, S. Denazis, A. Fernandez, D. Gaiti, F. Massacci, P. Nixon, F. Saffre, N. Schmidt, and F. Zambonelli. A Survey of Autonomic Communication. ACM Transactions on Autonomous and Adaptive Systems, 1(2):223-259, 2006.
  • 14
    • 0037236308 scopus 로고    scopus 로고
    • The Dawning of the Autonomie Computing Era
    • A. Ganek and T. Corbi. The Dawning of the Autonomie Computing Era. IBM Systems Journal, 42(1):5-18, 2003.
    • (2003) IBM Systems Journal , vol.42 , Issue.1 , pp. 5-18
    • Ganek, A.1    Corbi, T.2
  • 16
    • 33847778695 scopus 로고    scopus 로고
    • Secure Embedded Systems Need Microkernels
    • G. Heiser. Secure Embedded Systems Need Microkernels. The USENIX Magazine, 30(6):9-13, 2005.
    • (2005) The USENIX Magazine , vol.30 , Issue.6 , pp. 9-13
    • Heiser, G.1
  • 21
    • 0037253062 scopus 로고    scopus 로고
    • The Vision of Autonomie Computing
    • J. Kephart and D. Chess. The Vision of Autonomie Computing. IEEE Computer, 36(1):41-50, 2003.
    • (2003) IEEE Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.1    Chess, D.2
  • 22
  • 23
    • 33847789626 scopus 로고    scopus 로고
    • CAmkES: A Component Model for Secure Microkernel-Based Embedded Systems
    • I. Kuz, Y. Liu, I. Gorton, and G. Heiser. CAmkES: A Component Model for Secure Microkernel-Based Embedded Systems. Journal of Systems and Software, 80(5), 2006.
    • (2006) Journal of Systems and Software , vol.80 , Issue.5
    • Kuz, I.1    Liu, Y.2    Gorton, I.3    Heiser, G.4
  • 26
    • 3142569233 scopus 로고    scopus 로고
    • Highly Reliable Trust Establishment Scheme in Ad Hoc Networks
    • K. Ren, T. Li, Z. Wan, F. Bao, R. Deng, and K. Kim. Highly Reliable Trust Establishment Scheme in Ad Hoc Networks. Computer Networks, 45(6):687-699, 2004.
    • (2004) Computer Networks , vol.45 , Issue.6 , pp. 687-699
    • Ren, K.1    Li, T.2    Wan, Z.3    Bao, F.4    Deng, R.5    Kim, K.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.