scholarly journals An architecture of execution environment for context-aware applications running in intelligent space

2013 ◽  
Vol 17 (2) ◽  
pp. 207
Author(s):  
Sławomir Nasiadka ◽  
Henryk Krawczyk
Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


2009 ◽  
Vol 20 (10) ◽  
pp. 2655-2666 ◽  
Author(s):  
Dong LIU ◽  
Xiang-Wu MENG ◽  
Jun-Liang CHEN ◽  
Ya-Mei XIA

2012 ◽  
Vol 23 (1) ◽  
pp. 1-20 ◽  
Author(s):  
Li-Cai WANG ◽  
Xiang-Wu MENG ◽  
Yu-Jie ZHANG

2009 ◽  
Vol 29 (3) ◽  
pp. 892-895 ◽  
Author(s):  
Run-cai HUANG ◽  
Yi-wen ZHUANG ◽  
Ji-liang ZHOU ◽  
Qi-ying CAO

Sign in / Sign up

Export Citation Format

Share Document