E-Book, Englisch, Band 45, 392 Seiten
Spanoudakis / Kokolakis Security and Dependability for Ambient Intelligence
2009
ISBN: 978-0-387-88775-3
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, Band 45, 392 Seiten
Reihe: Advances in Information Security
ISBN: 978-0-387-88775-3
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms. An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems. Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;6
2;Contents;8
3;Chapter 1 Introduction: The SERENITY Vision;11
4;Part A: Foundations of Security and Dependability Engineering;29
4.1;Chapter 2 Security and Dependability Engineering;30
4.2;Chapter 3 Security Patterns and a Methodology to Apply them;46
5;Part B: The SERENITY Security and Dependability artefacts;56
5.1;Chapter 4 Specification of Security and Dependability Properties;57
5.2;Chapter 5 Representation of Security and Dependability Solutions;76
5.3;Chapter 6 Security and Dependability Solutions for Web Services and Workflows;103
5.4;Chapter 7 Security and Dependability Solutions for Networks and Devices;113
6;Part C: Developing SERENITY Aware Applications and S&D Solutions;130
6.1;Chapter 8 SERENITY Aware Development of Security and Dependability Solutions;131
6.2;Chapter 9 Verification of S&D Solutions for network communications and devices;146
6.3;Chapter 10 SERENITY Aware System Development Process;167
7;Part D: Runtime Support for Security and Dependability;182
7.1;Chapter 11 The SERENITY Runtime Framework;183
7.2;Chapter 12 Pattern Driven Selection and Configuration of S&D Mechanisms at Runtime;199
7.3;Chapter 13 The Runtime Monitoring Framework of SERENITY;213
7.4;Chapter 14 Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework;238
8;Part E: Dealing with Security and Dependability at Organisational and Legal Levels;271
8.1;Chapter 15 Organisational Pattern Driven Recovery Mechanisms;272
8.2;Chapter 16 Legal Issues of Ambient Intelligence in the SERENITY Project;288
9;Part F: Experiences and Future Directions;300
9.1;Chapter 17 SERENITY in e-Business and Smart Items Scenarios;301
9.2;Chapter 18 Realising the Potential of SERENITY in Emerging AmI Ecosystems: Implications and Challenges;319
9.3;Chapter 19 Applying the SERENITY methodology to the domain of trusted electronic archiving;339
9.4;Chapter 20 SERENITY in Air Traffic Management;354
9.5;Chapter 21 Future Directions;374
10;Index;379




