The importance of high assurance security in pervasive computing

被引:0
|
作者
Karger, PA [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
来源
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:9 / 9
页数:1
相关论文
共 50 条
  • [21] An Ultra lightweight encryption design for security in pervasive computing
    Bansod, Gaurav
    Patil, Abhijit
    Sutar, Swapnil
    Pisharoty, N.
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 79 - 84
  • [22] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    [J]. COMPUTER, 2001, 34 (12) : 154 - 157
  • [23] User-controllable security and privacy for pervasive computing
    Cornwell, Jason
    Fette, Ian
    Hsieh, Gary
    Prabaker, Madhu
    Rao, Jinghai
    Tang, Karen
    Vaniea, Kami
    Bauer, Lujo
    Cranor, Lorrie
    Hong, Jason
    McLaren, Bruce
    Reiter, Mike
    Sadeh, Norman
    [J]. EIGHTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 14 - +
  • [24] Importance of Cyber Security in Software Quality Assurance
    Haider, Ammar
    Bhatti, Wafa
    [J]. 2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 6 - 11
  • [25] Security clustering: A network-wide secure computing mechanism in pervasive computing
    Gu, J
    Park, S
    Nah, J
    Sohn, S
    Song, O
    [J]. NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1326 - 1331
  • [26] A pervasive computing security system based on human activities analysis
    Yuan, Yun
    Miao, Zhenjiang
    Hu, Shaohai
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1533 - +
  • [27] An Adaptive Framework for Trust based Security in Pervasive Computing Environment
    Iltaf, Naima
    Ghafoor, Abdul
    Hussain, Khtar
    [J]. 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 624 - 628
  • [28] Security and privacy in pervasive computing state of the art and future directions
    Hutter, D
    Stephan, W
    Ullmann, M
    [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 285 - 289
  • [29] Advances in security and multimodality for pervasive computing environmentsTS Special Issue
    Jong Hyuk Park
    Ching-Hsien Hsu
    Naveen Chilamkurti
    Mieso Denko
    [J]. Telecommunication Systems, 2013, 52 : 1341 - 1342
  • [30] Green Security Plugin for Pervasive Computing using the HADAS toolkit
    Munoz, Daniel-Jesus
    Montenegro, Jose A.
    Pinto, Monica
    Fuentes, Lidia
    [J]. 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 796 - 803