메뉴 건너뛰기




Volumn , Issue , 2014, Pages 78-87

A model-based security toolkit for the internet of things

Author keywords

Internet of things; Management; Security

Indexed keywords

MANAGEMENT;

EID: 84920575454     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2014.17     Document Type: Conference Paper
Times cited : (27)

References (27)
  • 6
    • 51849139552 scopus 로고    scopus 로고
    • An information model and architecture for context-aware management domains
    • IEEE Computer Society
    • R. Neisse, P. D. Costa, M. Wegdam, and M. van Sinderen, "An information model and architecture for context-aware management domains," in POLICY. IEEE Computer Society, 2008, pp. 162-169.
    • (2008) POLICY , pp. 162-169
    • Neisse, R.1    Costa, P.D.2    Wegdam, M.3    Van Sinderen, M.4
  • 7
    • 84893204247 scopus 로고    scopus 로고
    • A framework for privacy protection and usage control of personal data in a smart city scenario
    • G. Baldini, I. Kounelis, I. N. Fovino, and R. Neisse, "A framework for privacy protection and usage control of personal data in a smart city scenario," Critical Information Infrastructures Security, vol. 8328, pp. 212-217, 2013.
    • (2013) Critical Information Infrastructures Security , vol.8328 , pp. 212-217
    • Baldini, G.1    Kounelis, I.2    Fovino, I.N.3    Neisse, R.4
  • 10
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision, applications and research challenges
    • D. Miorandi, S. Sicari, F. D. Pellegrini, and I. Chlamtac, "Internet of things: Vision, applications and research challenges," Ad Hoc Networks, vol. 10, no. 7, pp. 1497-1516, 2012.
    • (2012) Ad Hoc Networks , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    Pellegrini, F.D.3    Chlamtac, I.4
  • 11
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things," Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013.
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 13
    • 84870663756 scopus 로고    scopus 로고
    • A model-driven approach to situations: Situation modeling and rule-based situation detection
    • P. D. Costa, I. T. Mielke, I. Pereira, and J. P. A. Almeida, "A model-driven approach to situations: Situation modeling and rule-based situation detection," in EDOC. IEEE, 2012, pp. 154-163.
    • (2012) EDOC. IEEE , pp. 154-163
    • Costa, P.D.1    Mielke, I.T.2    Pereira, I.3    Almeida, J.P.A.4
  • 15
    • 34250155623 scopus 로고    scopus 로고
    • Cosmo: A conceptual framework for service modelling and refinement
    • D. Quartel, M. Steen, S. Pokraev, and M. Sinderen, "Cosmo: A conceptual framework for service modelling and refinement," Information Systems Frontiers, vol. 9, no. 2-3, pp. 225-244, 2007.
    • (2007) Information Systems Frontiers , vol.9 , Issue.2-3 , pp. 225-244
    • Quartel, D.1    Steen, M.2    Pokraev, S.3    Sinderen, M.4
  • 16
    • 3142676730 scopus 로고    scopus 로고
    • Trust-x: A peer-to-peer framework for trust establishment
    • E. Bertino, E. Ferrari, and A. C. Squicciarini, "Trust-x: A peer-to-peer framework for trust establishment," IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 827-842, 2004.
    • (2004) IEEE Trans. Knowl. Data Eng. , vol.16 , Issue.7 , pp. 827-842
    • Bertino, E.1    Ferrari, E.2    Squicciarini, A.C.3
  • 22
    • 78149465725 scopus 로고    scopus 로고
    • Architectures for the future networks and the next generation internet: A survey
    • S. Paul, J. Pan, and R. Jain, "Architectures for the future networks and the next generation internet: A survey," Computer Communications, vol. 34, no. 1, pp. 2-42, 2011.
    • (2011) Computer Communications , vol.34 , Issue.1 , pp. 2-42
    • Paul, S.1    Pan, J.2    Jain, R.3
  • 23
    • 84880621938 scopus 로고    scopus 로고
    • A capabilitybased security approach to manage access control in the internet of things
    • S. Gusmeroli, S. Piccione, and D. Rotondi, "A capabilitybased security approach to manage access control in the internet of things," Mathematical and Computer Modelling, vol. 58, no. 5, pp. 1189-1205, 2013.
    • (2013) Mathematical and Computer Modelling , vol.58 , Issue.5 , pp. 1189-1205
    • Gusmeroli, S.1    Piccione, S.2    Rotondi, D.3
  • 24
    • 84920603298 scopus 로고    scopus 로고
    • 102 690 machine-to-machine communications m2m functional architecture
    • E. TS, "102 690 machine-to-machine communications m2m functional architecture," ETSI, 2011.
    • (2011) ETSI
    • Ts, E.1
  • 25
    • 84920557406 scopus 로고    scopus 로고
    • 102 921 machine-to-machine communications m2m mia dia and mid interfaces
    • E. TS, "102 921 machine-to-machine communications m2m mia dia and mid interfaces," ETSI, 2012.
    • (2012) ETSI
    • Ts, E.1
  • 27
    • 33645974729 scopus 로고    scopus 로고
    • Digital rights management: The open mobile alliance {DRM} specifications
    • J. Irwin, "Digital rights management: The open mobile alliance {DRM} specifications," Information Security Technical Report, vol. 9, no. 4, pp. 22-31, 2004.
    • (2004) Information Security Technical Report , vol.9 , Issue.4 , pp. 22-31
    • Irwin, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.