The importance of high assurance security in pervasive computing

被引:0
|
作者
Karger, PA [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
来源
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:9 / 9
页数:1
相关论文
共 50 条
  • [41] Security adaptive task scheduling for mission-critical pervasive computing
    Jiang, Wei
    Chang, Zhengwei
    Xiong, Guangze
    Sang, Nan
    [J]. Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2009, 21 (10): : 1487 - 1494
  • [42] A sense of security in pervasive computing - Is the light on when the refrigerator door is closed?
    Pagter, Jakob Illeborg
    Petersen, Marianne Graves
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 383 - 388
  • [43] Information Assurance and Security Education on Undergraduate Computing Degree Programs
    Lo, Dan C.
    Qian, Kai
    Shahriar, Hossain
    Wu, Fan
    Chern, Johng-Chern
    Paschos, Pascal
    Ng, Chung
    [J]. SIGCSE 2020: PROCEEDINGS OF THE 51ST ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2020, : 1274 - 1274
  • [44] CyberGuarder: A virtualization security assurance architecture for green cloud computing
    Li, Jianxin
    Li, Bo
    Wo, Tianyu
    Hu, Chunming
    Huai, Jinpeng
    Liu, Lu
    Lam, K. P.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (02): : 379 - 390
  • [45] Pervasive Computing
    Pervasive Computing verändert unser Leben
    [J]. Behrendt, S., 1600, Swisscom (81):
  • [46] Pervasive computing
    不详
    [J]. IEEE MICRO, 1999, 19 (04) : 80 - 80
  • [47] Pervasive computing
    Akyildiz, I
    Rudin, H
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2001, 35 (04): : 371 - 371
  • [48] A reference model for enterprise security -: High assurance enterprise security
    Enstrom, David W.
    Walsh, D'Arcy
    Hossendoust, Siavosh
    [J]. ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 355 - +
  • [49] Security in High Performance Computing
    Chugh, Urvashi
    Chugh, Amit
    [J]. INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 552 - 556
  • [50] A lightweight cyber security framework with context-awareness for pervasive computing environments
    Al-Muhtadi, Jalal
    Saleem, Kashif
    Al-Rabiaah, Sumayah
    Imran, Muhammad
    Gawanmeh, Amjad
    Rodrigues, Joel J. P. C.
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2021, 66