메뉴 건너뛰기




Volumn 18, Issue 4, 2016, Pages 665-677

A security-and quality-aware system architecture for Internet of Things

Author keywords

Data quality; Internet of Things; Privacy; Security; System architecture

Indexed keywords

DATA PRIVACY; NETWORK SECURITY;

EID: 84908425489     PISSN: 13873326     EISSN: 15729419     Source Type: Journal    
DOI: 10.1007/s10796-014-9538-x     Document Type: Article
Times cited : (111)

References (31)
  • 1
    • 84879815746 scopus 로고    scopus 로고
    • Anonymous authentication for privacy-preserving IOT target-driven applications
    • Alcaide, A., Palomar, E., Montero-Castillo, J., & Ribagorda, A. (2013). “Anonymous authentication for privacy-preserving IOT target-driven applications.” Computers & Security, 37, 111–123.
    • (2013) Computers & Security , vol.37 , pp. 111-123
    • Alcaide, A.1    Palomar, E.2    Montero-Castillo, J.3    Ribagorda, A.4
  • 4
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Atzori, L., Iera, A., & Morabito, G. (2010). “The internet of things: A survey.” Computer networks, 54(15), 2787–2805.
    • (2010) Computer networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 5
    • 0022010535 scopus 로고
    • Modeling Data and Process Quality in Multi-input, Multi-output Information Systems
    • Ballou, D. P., & Pazer, H. L. (1985). Modeling Data and Process Quality in Multi-input, Multi-output Information Systems. Management Science, 31(2), 150–162.
    • (1985) Management Science , vol.31 , Issue.2 , pp. 150-162
    • Ballou, D.P.1    Pazer, H.L.2
  • 12
    • 84888014600 scopus 로고    scopus 로고
    • Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things
    • Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou X. (2013). “Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things”. Journal of Network and Computer Applications, 36(6), 1531–1539. doi:10.1016/j.jnca.2012.12.028
    • (2013) Journal of Network and Computer Applications , vol.36 , Issue.6 , pp. 1531-1539
    • Guo, B.1    Zhang, D.2    Wang, Z.3    Yu, Z.4    Zhou, X.5
  • 14
    • 84979866253 scopus 로고    scopus 로고
    • Internet of ThingsStrategicResearchRoadmap
    • Internet of ThingsStrategicResearchRoadmap; available online at: http://ec.europa.eu/information_society/policy/rfid/documents/in_cerp.pdf
  • 15
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: the PriS method
    • Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2008). Addressing privacy requirements in system design: the PriS method. Requirements Engineering, 13(3), 241–255.
    • (2008) Requirements Engineering , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 17
    • 84874029588 scopus 로고    scopus 로고
    • Data Quality Observation in Pervasive Environments. In Proceedings of the 2012 I.E. 15th International Conference on Computational Science and Engineering (CSE ’12). IEEE Computer Society, Washington, DC
    • Li, F., Nastic, S., & Dustdar, S. (2012). Data Quality Observation in Pervasive Environments. In Proceedings of the 2012 I.E. 15th International Conference on Computational Science and Engineering (CSE ’12). IEEE Computer Society, Washington, DC, USA, 602–609. doi:10.1109/ICCSE.2012.88
    • (2012) USA , pp. 602-609
    • Li, F.1    Nastic, S.2    Dustdar, S.3
  • 18
    • 34548019652 scopus 로고    scopus 로고
    • Lindner, W., & Meier, J. “Securing the borealis data stream engine,” in ser. IDEAS’06. Washington, DC, USA: IEEE Computer Society, pp. 137–147. [Online]
    • Lindner, W., & Meier, J. “Securing the borealis data stream engine,” in Proceedings of the 10th International Database Engineering and Applications Symposium, ser. IDEAS’06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 137–147. [Online]. Available: http:www.//dx.doi.org/10.1109/IDEAS.2006.40
    • (2006) Proceedings of the 10th International Database Engineering and Applications Symposium
  • 19
    • 84979863323 scopus 로고    scopus 로고
    • Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., & Hung Byers A. “Big data: The next frontier for innovation, competition, and productivity” [Online]
    • Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., & Hung Byers A. “Big data: The next frontier for innovation, competition, and productivity” Report McKinsey Global Institute 2011. [Online] Available: http://www.mckinsey.com/mgi/publications/big_data/
    • (2011) Report McKinsey Global Institute
  • 21
    • 84861997111 scopus 로고    scopus 로고
    • Survey internet of things: Vision, applications and research challenges
    • Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Survey internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.
    • (2012) Ad Hoc Networks , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 22
    • 0026883734 scopus 로고
    • Representing and using nonfunctional requirements: a process-oriented approach
    • Mylopoulos, J., Chung, L., and Nixon, B. “Representing and using nonfunctional requirements: a process-oriented approach,” Software Engineering, IEEE Transactions on, vol. 18, no. 6, pp. 483 –497, Jun. 1992
    • (1992) Software Engineering, IEEE Transactions on , vol.18 , Issue.6 , pp. 483-497
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.3
  • 23
    • 52649140439 scopus 로고    scopus 로고
    • E. “A security punctuation framework for enforcing access control on streaming data,” in Data Engineering, 2008. ICDE 2008
    • Nehme, R., Rundensteiner, E., & Bertino, E. “A security punctuation framework for enforcing access control on streaming data,” in Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, April 2008, pp. 406 –415
    • (2008) IEEE 24th International Conference on , pp. 406-415
    • Nehme, R.1    Rundensteiner, E.2
  • 24
    • 85011016388 scopus 로고    scopus 로고
    • Papadopoulos, S., Yang, Y., & Papadias, D. “Cads: continuous authentication on data streams,” in, pp. 135–146. [Online]
    • Papadopoulos, S., Yang, Y., & Papadias, D. “Cads: continuous authentication on data streams,” in Proceedings of the 33rd international conference on Very large data bases, ser. VLDB’07. VLDB Endowment, 2007, pp. 135–146. [Online]. Available: http://dl.acm.org/citation.cfm?id=1325851.1325870
    • (2007) Proceedings of the 33rd international conference on Very large data bases, ser. VLDB’07. VLDB Endowment
  • 25
    • 36749060136 scopus 로고    scopus 로고
    • Service-Oriented Computing: State of the Art and Research Challenges
    • Papazoglou, M. P., Traverso, P., Dustdar, S., & Leymann, F. (2007). Service-Oriented Computing: State of the Art and Research Challenges. IEEE Computer, 40(11), 38–45.
    • (2007) IEEE Computer , vol.40 , Issue.11 , pp. 38-45
    • Papazoglou, M.P.1    Traverso, P.2    Dustdar, S.3    Leymann, F.4
  • 26
    • 0030086382 scopus 로고    scopus 로고
    • Sandhu, R. S., Coyne, E. J., Feinstein, H. L. and Youman, C. E. Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996. [Online]
    • Sandhu, R. S., Coyne, E. J., Feinstein, H. L. and Youman, C. E. “Role-based access control models,” Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996. [Online]. Available: http://dx.doi.org/10.1109/2.485845
    • (1996) Role-based access control models
  • 27
    • 80755190141 scopus 로고    scopus 로고
    • DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
    • Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.
    • (2012) Journal of Systems and Software , vol.85 , Issue.1 , pp. 152-166
    • Sicari, S.1    Grieco, L.A.2    Boggia, G.3    Coen-Porisini, A.4
  • 28
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • van Lamsweerde, A., & Letier, E. (2000). Handling obstacles in goal-oriented requirements engineering. IEEE Transactions on Software Engineering, 26(10), 978–1005.
    • (2000) IEEE Transactions on Software Engineering , vol.26 , Issue.10 , pp. 978-1005
    • van Lamsweerde, A.1    Letier, E.2
  • 31
    • 43249115954 scopus 로고    scopus 로고
    • Deploying and Managing Web Services: Issues, Solutions, and Directions
    • Yu, Q., Bouguettaya, A., & Medjahed, B. (2008). Deploying and Managing Web Services: Issues, Solutions, and Directions. The VLDB Journal, 17(3), 537–572.
    • (2008) The VLDB Journal , vol.17 , Issue.3 , pp. 537-572
    • Yu, Q.1    Bouguettaya, A.2    Medjahed, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.