The importance of high assurance security in pervasive computing

被引:0
|
作者
Karger, PA [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
来源
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:9 / 9
页数:1
相关论文
共 50 条
  • [1] The importance of high assurance security in Pervasive Computing: (Abstract of invited talk)
    Karger, Paul A.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 2802
  • [2] Security in pervasive computing
    Stajano, F
    [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 6 - 8
  • [3] Towards pervasive computing security
    Mohammed, L. A.
    [J]. WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 810 - 815
  • [4] Tailored Security and Safety for Pervasive Computing
    Blass, Erik-Oliver
    Zitterbart, Martina
    [J]. INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 : 85 - +
  • [5] Towards security and privacy for pervasive computing
    Campbell, R
    Al-Muhtadi, J
    Naldurg, P
    Sampemane, G
    Mickunas, MD
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 1 - 15
  • [6] Security in pervasive computing - Calling for new security principles
    Zugenmaier, Alf
    Walter, Thomas
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 96 - +
  • [7] Security for whom? The shifting security assumptions of pervasive computing
    Stajano, F
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 16 - 27
  • [8] Microcontrollers as (In) Security Devices for Pervasive Computing Applications
    Strobel, Daehyun
    Oswald, David
    Richter, Bastian
    Schellenberg, Falk
    Paar, Christof
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1157 - 1173
  • [9] Advances in security and multimodality for pervasive computing environments
    Park, Jong Hyuk
    Hsu, Ching-Hsien
    Chilamkurti, Naveen
    Denko, Mieso
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1341 - 1342
  • [10] Security Access Model in Pervasive Computing Environment
    Zhou Y.-W.
    Yang B.
    Zhang W.-Z.
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965