IoT Security Configurability with Security-by-Contract
نویسندگان
چکیده
منابع مشابه
IoT Security: A Survey
The Internet of Things (IoT) is still at the top of the Gartner Hype Cycle as the most hyped technology, which means that it is the hottest topic that has gained the most attraction of the researchers currently. In recent years, there have been huge amount of research that have investigated different aspects and concerns of this field. Meanwhile, supplying privacy and security is an inseparable...
متن کاملRemote Security Surveillance by IoT Based Robot
This paper presents the control of terrorist attack throughout the world by monitoring and controlling of mobile robot via internet through Raspberry pi board. The monitoring and controlling of robotic movements through wireless network by using a web browser and accessing a webpage through an IP address. A camera is mounted on the robot to get better visibility of the objects. The programming ...
متن کاملSecurity-by-contract on the .NET platform
Over the last few years, the success of GPS-enabled PDAs has finally instigated a breakthrough of mobile devices. Many people now already have a device that can connect to the internet and run untrusted code, typically a cell-phone or PDA. Having such a large interconnected and powerful computing base presents some new security issues. In order to counter new threats, the traditional security a...
متن کاملEnforcing Private Policy via Security-by-Contract
This work aims to investigate how the Security-by-Contract (SxC) paradigm, developed for providing security assurances to mobile applications, can be used for guaranteeing the security of communicating systems composed by several, heterogeneous components. These components need to communicate with each other by establishing direct, point to point connections. Direct connections can involve comp...
متن کاملTesting Decision Procedures for Security - by - Contract ∗
The traditional realm of formal methods is the off-line verification of formal properties of hardware and software. In this paper we report a different approach that uses formal methods (namely the integration of automata modulo theory with decision procedures) on-the-fly, at the time an application is downloaded on a mobile application such as PDA or a smart phone. The idea behind security-by-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2019
ISSN: 1424-8220
DOI: 10.3390/s19194121