LEARNER CENTRIC IN M-LEARNING: INTEGRATION OF SECURITY, DEPENDABILITY AND TRUST
暂无分享,去创建一个
[1] Young-Koo Lee,et al. A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).
[2] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Chuang Lin,et al. Model-Driven Dependability Analysis of Virtualization Systems , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.
[4] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[5] G. Buja,et al. Conceptual frameworks for dependability and safety of a system , 2006, International Symposium on Power Electronics, Electrical Drives, Automation and Motion, 2006. SPEEDAM 2006..
[6] Erland Jonsson,et al. Towards an integrated conceptual model of security and dependability , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[7] John E. Dobson,et al. On the Trustworthiness of Computing Systems , 1990 .
[8] Jörg Henkel,et al. Dependability and Security Will Change Embedded Computing , 2008, Computer.
[9] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[10] Nicholas Kyriakopoulos,et al. A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability , 2009, IEEE Communications Surveys & Tutorials.
[11] Jiankun Hu,et al. Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy , 2011, J. Netw. Comput. Appl..
[12] Brian Randell,et al. Fundamental Concepts of Dependability , 2000 .
[13] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[14] Catherine A. Meadows,et al. Applying the dependability paradigm to computer security , 1995, Proceedings of 1995 New Security Paradigms Workshop.
[15] Karin Sallhammar,et al. Stochastic Models for Combined Security and Dependability Evaluation , 2007 .
[16] George Spanoudakis. Monitoring Security and Dependability in Mobile P2P Systems , 2008 .
[17] Hermann Kopetz,et al. Dependability: Basic Concepts and Terminology , 1992 .
[18] Jean-Claude Laprie,et al. Dependable computing: concepts, limits, challenges , 1995 .
[19] Deep Medhi,et al. Dependability and security models , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.
[20] Reijo Savola,et al. Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry , 2007, International Conference on Software Engineering Advances (ICSEA 2007).