Security and Dependability for Ambient Intelligence Security and Dependability for Ambient Intelligence
Advances in Information Security

Security and Dependability for Ambient Intelligence

    • 134,99 €
    • 134,99 €

Beschreibung des Verlags

Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms.

An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems.

Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.

GENRE
Computer und Internet
ERSCHIENEN
2009
21. April
SPRACHE
EN
Englisch
UMFANG
401
Seiten
VERLAG
Springer US
ANBIETERINFO
Springer Science & Business Media LLC
GRÖSSE
3,3
 MB
Internetware Internetware
2016
Enterprise Information Systems VII Enterprise Information Systems VII
2007
Evaluation of Novel Approaches to Software Engineering Evaluation of Novel Approaches to Software Engineering
2020
Evaluation of Novel Approaches to Software Engineering Evaluation of Novel Approaches to Software Engineering
2019
Evaluation of Novel Approaches to Software Engineering Evaluation of Novel Approaches to Software Engineering
2018
Services Computing – SCC 2018 Services Computing – SCC 2018
2018
Cyber Situational Awareness Cyber Situational Awareness
2009
Network Intrusion Detection and Prevention Network Intrusion Detection and Prevention
2009
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Insider Threats in Cyber Security Insider Threats in Cyber Security
2010
Adaptive Cryptographic Access Control Adaptive Cryptographic Access Control
2010
Spyware and Adware Spyware and Adware
2010