메뉴 건너뛰기




Volumn 2015-January, Issue , 2014, Pages 1244-1248

A taxonomy of security and privacy requirements for the Internet of Things (IoT)

Author keywords

Internet of Things; privacy; requirements engineering; security

Indexed keywords

DATA PRIVACY; INTERNET; NETWORK SECURITY; REQUIREMENTS ENGINEERING; TAXONOMIES;

EID: 84988258905     PISSN: 21573611     EISSN: 2157362X     Source Type: Conference Proceeding    
DOI: 10.1109/IEEM.2014.7058837     Document Type: Conference Paper
Times cited : (87)

References (26)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Oct.
    • L. Atzori, A. Iera, and G. Morabito. The internet of things: A survey. Computer Networks, 54(15):2787-2805, Oct. 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 5
    • 84924283036 scopus 로고    scopus 로고
    • Analyzing and specifying reusable security requirements
    • D. G. Firesmith. Analyzing and specifying reusable security requirements. In Proc. Solid Freeform Fabrication Sym, pages 507-514, 2003.
    • (2003) Proc. Solid Freeform Fabrication Sym , pp. 507-514
    • Firesmith, D.G.1
  • 7
    • 84878388190 scopus 로고    scopus 로고
    • Privacy in the cloud: Applying nissenbaum's theory of contextual integrity
    • Oct.
    • F. S. Grodzinsky and H. T. Tavani. Privacy in "the Cloud": Applying Nissenbaum's Theory of Contextual Integrity. SIGCAS Comput. Soc., 41(1):38-47, Oct. 2011.
    • (2011) SIGCAS Comput. Soc. , vol.41 , Issue.1 , pp. 38-47
    • Grodzinsky, F.S.1    Tavani, H.T.2
  • 12
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision, applications and research challenges
    • Sept.
    • D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac. Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7):1497-1516, Sept. 2012.
    • (2012) Ad Hoc Networks , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 14
    • 66649114331 scopus 로고    scopus 로고
    • Multiparty nonrepudiation: A survey
    • Jan.
    • J. A. Onieva, J. Zhou, and J. Lopez. Multiparty nonrepudiation: A survey. ACM Comput. Surv., 41(1):5:1-5:43, Jan. 2009.
    • (2009) ACM Comput. Surv. , vol.41 , Issue.1 , pp. 51-543
    • Onieva, J.A.1    Zhou, J.2    Lopez, J.3
  • 15
    • 84885328301 scopus 로고    scopus 로고
    • Svelte: Real-time intrusion detection in the internet of things
    • S. Raza, L. Wallgren, and T. Voigt. Svelte: Real-time intrusion detection in the internet of things. Ad Hoc Networks, 11(8):2661-2674, 2013.
    • (2013) Ad Hoc Networks , vol.11 , Issue.8 , pp. 2661-2674
    • Raza, S.1    Wallgren, L.2    Voigt, T.3
  • 16
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • July
    • R. Roman, J. Zhou, and J. Lopez. On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10):2266-2279, July 2013.
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 18
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Feb
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. Computer, 29(2):38-47, Feb 1996.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 24
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • May
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. Enabling public auditability and data dynamics for storage security in cloud computing. Parallel and Distributed Systems, IEEE Transactions on, 22(5):847-859, May 2011.
    • (2011) Parallel and Distributed Systems, IEEE Transactions on , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 25
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things-new security and privacy challenges
    • R. H. Weber. Internet of things-new security and privacy challenges. Computer Law & Security Review, 26(1):23-30, 2010.
    • (2010) Computer Law & Security Review , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.