↓ Skip to main content

Security in Pervasive Computing

Overview of attention for book
Cover of 'Security in Pervasive Computing'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 The Age of Pervasive Computing – Everything Smart, Everything Connected?
  3. Altmetric Badge
    Chapter 2 Cyber Assist Project and Its Security Requirement
  4. Altmetric Badge
    Chapter 3 Security in Pervasive Computing
  5. Altmetric Badge
    Chapter 4 The Importance of High Assurance Security in Pervasive Computing
  6. Altmetric Badge
    Chapter 5 A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
  7. Altmetric Badge
    Chapter 6 Protecting Access to People Location Information
  8. Altmetric Badge
    Chapter 7 Smart Devices and Software Agents: The Basics of Good Behaviour
  9. Altmetric Badge
    Chapter 8 Dependability Issues of Pervasive Computing in a Healthcare Environment
  10. Altmetric Badge
    Chapter 9 Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
  11. Altmetric Badge
    Chapter 10 Enforcing Security Policies via Types
  12. Altmetric Badge
    Chapter 11 Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
  13. Altmetric Badge
    Chapter 12 Authentication for Pervasive Computing
  14. Altmetric Badge
    Chapter 13 End-to-End Trust Starts with Recognition
  15. Altmetric Badge
    Chapter 14 Embedding Distance-Bounding Protocols within Intuitive Interactions
  16. Altmetric Badge
    Chapter 15 Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
  17. Altmetric Badge
    Chapter 16 Time Constraint Delegation for P2P Data Decryption
  18. Altmetric Badge
    Chapter 17 SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing
  19. Altmetric Badge
    Chapter 18 Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
  20. Altmetric Badge
    Chapter 19 Implementing a Formally Verifiable Security Protocol in Java Card
  21. Altmetric Badge
    Chapter 20 Cellular Automata Based Multiplier for Public-Key Cryptosystem
  22. Altmetric Badge
    Chapter 21 Enlisting Hardware Architecture to Thwart Malicious Code Injection
  23. Altmetric Badge
    Chapter 22 Optimized RISC Architecture for Multiple-Precision Modular Arithmetic
  24. Altmetric Badge
    Chapter 23 Visual Crypto Displays Enabling Secure Communications
  25. Altmetric Badge
    Chapter 24 Security and Privacy in Pervasive Computing State of the Art and Future Directions
Attention for Chapter 10: Enforcing Security Policies via Types
Altmetric Badge

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
14 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Enforcing Security Policies via Types
Chapter number 10
Book title
Security in Pervasive Computing
Published by
Springer, Berlin, Heidelberg, January 2004
DOI 10.1007/978-3-540-39881-3_10
Book ISBNs
978-3-54-020887-7, 978-3-54-039881-3
Authors

Daniele Gorla, Rosario Pugliese, Gorla, Daniele, Pugliese, Rosario

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 14 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Spain 1 7%
United States 1 7%
Italy 1 7%
Unknown 11 79%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 29%
Researcher 3 21%
Other 2 14%
Professor > Associate Professor 2 14%
Student > Master 2 14%
Other 1 7%
Readers by discipline Count As %
Computer Science 11 79%
Business, Management and Accounting 1 7%
Psychology 1 7%
Economics, Econometrics and Finance 1 7%