2008
DOI: 10.1007/978-3-540-70567-3_23
|View full text |Cite
|
Sign up to set email alerts
|

An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems

Abstract: Abstract. Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very far-reaching consequences. In addition, a number of factors make the task of defending against malicious attacks in pervasive systems even more complex than conventional systems. Foremost among them is that a significant number of the devices deployed in such environments are frequently severely resource constrained. Thus str… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 12 publications
(16 reference statements)
0
0
0
Order By: Relevance