Security and Dependability for Ambient Intelligence

Lieferzeit: Lieferbar innerhalb 14 Tagen

160,49 

Advances in Information Security 45

ISBN: 1441947000
ISBN 13: 9781441947000
Herausgeber: George Spanoudakis/Spyros Kokolakis
Verlag: Springer Verlag GmbH
Umfang: ix, 392 S., 50 s/w Illustr., 30 farbige Illustr., 392 p. 80 illus., 30 illus. in color.
Erscheinungsdatum: 08.12.2010
Auflage: 1/2009
Produktform: Kartoniert
Einband: KT

Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms. An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems. Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.

Artikelnummer: 1555962 Kategorie:

Beschreibung

InhaltsangabePreface.- Introduction.- Security and Dependability in Ambient Intelligence (AmI).- Security and Dependability Engineering.- The Use of Patterns in Security and Dependability Engineering: An Overview.- The SERENITY vision.- Realising the Vision Specification of S&D Properties.- Representation of Security and Dependability Solutions.- Organisational Level S&D Patterns.- S&D patterns for Web Services and Workflows.- Network and Communication S&D Patterns.- Pattern Integration Schemes.- SERENITY S&D Solution Development Process.- SERENITY Trust Model.- Verification Using the Secure Tropos Approach.- Verification Using APA-SHVT.- Verification Using Avispa.- Complementing Solutions with Monitoring.- Transforming Verification Results into Models.- Exploiting S&D Patterns in System Development.- SERENITY System Development Process.- Pattern Libraries and their Use System Development.- Exploiting S&D Patterns at Runtime.- The SERENITY Framework.- Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime.- Pattern Driven Detection of S&D Intrusions and Threats.- Diagnosing S&D Iintrusions.- Recovery and Control for S&D Intrusions and Threats.- Supporting the Evolution of S&D Patterns.- Experiences and Future Directions.- Applications of SERENITY Framework on Industrial Case Studies - Experiences and Challenges.- Standardization.- Realizing the Potential of SERENITY in Emerging AmI Ecosystems: Implications and Challenges.- Index.

Inhaltsverzeichnis

Preface.- Introduction.- Security and Dependability in Ambient Intelligence (AmI).- Security and Dependability Engineering.- The Use of Patterns in Security and Dependability Engineering: An Overview.- The SERENITY vision.- Realising the Vision Specification of S&D Properties.- Representation of Security and Dependability Solutions.- Organisational Level S&D Patterns.- S&D patterns for Web Services and Workflows.- Network and Communication S&D Patterns.- Pattern Integration Schemes.- SERENITY S&D Solution Development Process.- SERENITY Trust Model.- Verification Using the Secure Tropos Approach.- Verification Using APA-SHVT.- Verification Using Avispa.- Complementing Solutions with Monitoring.- Transforming Verification Results into Models.- Exploiting S&D Patterns in System Development.- SERENITY System Development Process.- Pattern Libraries and their Use System Development.- Exploiting S&D Patterns at Runtime.- The SERENITY Framework.- Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime.- Pattern Driven Detection of S&D Intrusions and Threats.- Diagnosing S&D Iintrusions.- Recovery and Control for S&D Intrusions and Threats.- Supporting the Evolution of S&D Patterns.- Experiences and Future Directions.- Applications of SERENITY Framework on Industrial Case Studies - Experiences and Challenges.- Standardization.- Realizing the Potential of SERENITY in Emerging AmI Ecosystems: Implications and Challenges.- Index.

Das könnte Ihnen auch gefallen …