Internet‐of‐things architectures for secure cyber–physical spaces: The VISOR experience report
نویسندگان
چکیده
منابع مشابه
Secure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملArchitectures and Formal Representations for Secure Systems Architectures and Formal Representations for Secure Systems Executive Summary
As used in this report, the term formal methods encompasses mathematical and logical techniques for representing and analyzing computer systems, with the intent of increasing (1) the rigor with which a system can be deened, (2) the security and reliability that can be attained by system design and implementation, and (3) the dependability with which the requirements can be met. This report cons...
متن کاملSecure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which the various representations of the architecture of a software system are described formally and the desired security properties of the system are proven to hold at the architectural level. The main ideas are illustrat...
متن کاملDesigning Secure Integration Architectures
Security has become a paramount concern due to dramatic advances of network technologies and a wide variety of new business opportunities. These advances have also brought the need for integration of computers systems to the surface, mainly for real-time, information sharing. As these systems are network-based, COTS products are predominantly used in these types of integration efforts. Since se...
متن کاملSecure Software Architectures
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clients and servers). This code is often particular to the application and the context in which the application is used. Embedding protection definitions in the application code makes it difficult to reuse because differen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of software
سال: 2022
ISSN: ['1796-217X']
DOI: https://doi.org/10.1002/smr.2511