Introduction: The SERENITY vision

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter we present an overview of the SERENITY approach. We describe the SERENITY model of secure and dependable applications and show how it addresses the challenge of developing, integrating and dynamically maintaining security and dependability mechanisms in open, dynamic, distributed and heterogeneous computing systems and in particular Ambient Intelligence scenarios. The chapter describes the basic concepts used in the approach and introduces the different processes supported by SERENITY, along with the tools provided. © Springer Science + Business Media, LLC 2009.

Cite

CITATION STYLE

APA

Maña, A., Spanoudakis, G., & Kokolakis, S. (2009). Introduction: The SERENITY vision. Advances in Information Security, 45, 1–18. https://doi.org/10.1007/978-0-387-88775-3_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free