An architecture for distributed OASIS services
IFIP/ACM International Conference on Distributed systems platforms
Cross-domain one-shot authorization using smart cards
Proceedings of the 7th ACM conference on Computer and communications security
ACM SIGAda Ada Letters
Security attribute evaluation method: a cost-benefit approach
Proceedings of the 24th International Conference on Software Engineering
Computer
Authorization and Attribute Certificates for Widely Distributed Access Control
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Extended Description Techniques for Security Engineering
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
The grand challenge of Trusted Components
Proceedings of the 25th International Conference on Software Engineering
A Resource Access Decision Service for CORBA-Based Distributed Systems
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Secure mediation: requirements, design, and architecture
Journal of Computer Security - IFIP 2000
Authorization in Distributed Systems: A Formal Approach
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
A unified security framework for networked applications
Proceedings of the 2003 ACM symposium on Applied computing
Rule Languages for Security and Privacy in Cooperative Systems
COMPSAC '05 Proceedings of the 29th Annual International Computer Software and Applications Conference - Volume 01
Secure Data Aggregation in Wireless Sensor Networks: A Survey
PDCAT '06 Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Policy-Driven Negotiation for Authorization in the Grid
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
Extended Abstract: Forward-Secure Sequential Aggregate Authentication
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Proceedings of the 11th international conference on Artificial intelligence and law
Security and Dependability for Ambient Intelligence
Security and Dependability for Ambient Intelligence
Advanced Policy Explanations on the Web
Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy
Interoperable and adaptive fuzzy services for ambient intelligence applications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Explaining answers from the Semantic Web: the Inference Web approach
Web Semantics: Science, Services and Agents on the World Wide Web
Hi-index | 0.00 |
Providing context-dependent security services is an important challenge for ambient intelligent systems. The complexity and the unbounded nature of such systems make it difficult even for the most experienced and knowledgeable security engineers, to foresee all possible situations and interactions when developing the system. In order to solve this problem context based self- diagnosis and reconfiguration at runtime should be provided. We present in this paper a generic security and dependability framework for the dynamic provision of Security and Dependability (S&D) solutions at runtime. Through out the paper, we use a smart items based e-health scenario to illustrate our approach. The eHealth prototype has been implemented and demonstrated in many scientific and industrial events.