Author:
Al Ali Rima,Bures Tomas,Hnetynka Petr,Krijt Filip,Plasil Frantisek,Vinarek Jiri
Publisher
Springer International Publishing
Reference22 articles.
1. Lecture Notes in Computer Science;M Almorsy,2012
2. Lecture Notes in Computer Science;Y Abd Alrahman,2016
3. Bures, T., et al.: Software abstractions for component interaction in the internet of things. Computer 49(12), 50–59 (2016)
4. Bures, T., et al.: Trait-based language for smart cyber-physical systems. Technical report D3S-TR-2017-01, Charles University (2017)
5. Chaisiri, S., Ko, R.K.L.: From reactionary to proactive security: context-aware security policy management and optimization under uncertainty. In: Proceedings of Trustcom/BigDataSE/ISPA 2016, Tianjin, China, pp. 535–543. IEEE (2016)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Toward autonomically composable and context-dependent access control specification through ensembles;International Journal on Software Tools for Technology Transfer;2020-03-10
2. Capturing Dynamicity and Uncertainty in Security and Trust via Situational Patterns;Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles;2020
3. Dynamic security rules for legacy systems;Proceedings of the 13th European Conference on Software Architecture - ECSA '19 - volume 2;2019
4. The Meaning of Adaptation: Mastering the Unforeseen?;Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems;2018
5. Rigorous Engineering of Collective Adaptive Systems Introduction to the 2nd Track Edition;Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems;2018