메뉴 건너뛰기




Volumn 249, Issue , 2016, Pages 219-230

APPARATUS: Reasoning about security requirements in the internet of things

Author keywords

Information security; Internet of things; IoT conceptual model; Security requirements engineering

Indexed keywords

CLUSTER COMPUTING; INFORMATION SYSTEMS; INTERNET; REQUIREMENTS ENGINEERING; SECURITY OF DATA; SYSTEMS ENGINEERING; UBIQUITOUS COMPUTING;

EID: 84976606583     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-39564-7_21     Document Type: Conference Paper
Times cited : (14)

References (23)
  • 1
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • Weiser, M.: The computer for the 21st century. Sci. Am. 265(3), 94-104 (1991)
    • (1991) Sci. Am , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787-2805 (2010)
    • (2010) Comput. Netw , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
  • 4
    • 84938672829 scopus 로고    scopus 로고
    • Security for the internet of things: A survey of existing protocols and open research issues
    • Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials 17(3), 1294-1312 (2015)
    • (2015) IEEE Commun. Surv. Tutorials , vol.17 , Issue.3 , pp. 1294-1312
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 5
    • 84910149653 scopus 로고    scopus 로고
    • Security of the internet of things: Perspectives and challenges
    • Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wireless Netw. 20(8), 2481-2501 (2014)
    • (2014) Wireless Netw , vol.20 , Issue.8 , pp. 2481-2501
    • Jing, Q.1    Vasilakos, A.V.2    Wan, J.3    Lu, J.4    Qiu, D.5
  • 6
    • 84861019658 scopus 로고    scopus 로고
    • Security in the internet of things: A review. In: 2012 International Conference on Computer Science and Electronics Engineering, (Hangzhou)
    • Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, (Hangzhou), pp. 648-651. Institute of Electrical & Electronics Engineers (IEEE) (2012)
    • (2012) Institute of Electrical & Electronics Engineers (IEEE) , pp. 648-651
    • Suo, H.1    Wan, J.2    Zou, C.3    Liu, J.4
  • 9
    • 84976649454 scopus 로고    scopus 로고
    • Analyzing and specifying security requirements in early stages of software development life cycle
    • Coles, E.S.: Analyzing and specifying security requirements in early stages of software development life cycle. J. Mobile Embed. Distrib. Syst. 7(2), 87-94 (2015)
    • (2015) J. Mobile Embed. Distrib. Syst , vol.7 , Issue.2 , pp. 87-94
    • Coles, E.S.1
  • 10
    • 33751189883 scopus 로고    scopus 로고
    • Security quality requirements engineering (square) methodology
    • Mead, N.R., Stehney, T.: Security quality requirements engineering (square) methodology. ACM SIGSOFT Softw. Eng. Notes 30(4), 1-7 (2005)
    • (2005) ACM SIGSOFT Softw. Eng. Notes , vol.30 , Issue.4 , pp. 1-7
    • Mead, N.R.1    Stehney, T.2
  • 11
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • Giorgini, P., Mouratidis, H.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(02), 285-309 (2011)
    • (2011) Int. J. Softw. Eng. Knowl. Eng , vol.17 , Issue.2 , pp. 285-309
    • Giorgini, P.1    Mouratidis, H.2
  • 12
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17, 285-309 (2007)
    • (2007) Int. J. Softw. Eng. Knowl. Eng , vol.17 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 14
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133-153 (2008)
    • (2008) IEEE Trans. Softw. Eng , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.1    Laney, R.2    Moffett, J.3    Nuseibeh, B.4
  • 19
    • 84976266081 scopus 로고    scopus 로고
    • State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing
    • Díaz, M., Martín, C., Rubio, B.: State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing. J. Netw. Comput. Appl. 67, pp. 99-117 (2016)
    • (2016) J. Netw. Comput. Appl , vol.67 , pp. 99-117
    • Díaz, M.1    Martín, C.2    Rubio, B.3
  • 22
    • 79953005010 scopus 로고    scopus 로고
    • Future internet: The internet of things (Chengdu)
    • Lu, T., Neng, W.: Future internet: the internet of things (Chengdu), vol. 5, p. 376. IEEE (2010)
    • (2010) IEEE , vol.5 , pp. 376
    • Lu, T.1    Neng, W.2
  • 23
    • 84900398751 scopus 로고    scopus 로고
    • Designing IoT architecture(s): A European perspective
    • Institute of Electrical & Electronics Engineers (IEEE)
    • Krco, S., Pokric, B., Carrez, F.: Designing IoT architecture(s): a European perspective. In: 2014 IEEE World Forum on Internet of Things (WF-IoT) (Seoul), pp. 79-84 Institute of Electrical & Electronics Engineers (IEEE) (2014)
    • (2014) 2014 IEEE World Forum on Internet of Things (WF-IoT) (Seoul) , pp. 79-84
    • Krco, S.1    Pokric, B.2    Carrez, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.