[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2938559.2948769acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
poster

Poster: Exploring Security as a Service for IoT Enabled Remote Application Framework

Published: 25 June 2016 Publication History

Abstract

This paper discusses the need for new security frameworks for IoT enabled remote applications. It considers real life scenario as a case study to explicitly represent the relationship between security requirements and security goals. Security as a service is a subscription model in IoT environment that needs to be customized to meet the application specific goal. This paper provides the basic idea about how to do this.

Cited By

View all
  • (2020)Research on Artificial Intelligence Enhancing Internet of Things Security: A SurveyIEEE Access10.1109/ACCESS.2020.30181708(153826-153848)Online publication date: 2020
  • (2019)Tenant-Oriented Monitoring for Customized Security Services in the CloudSymmetry10.3390/sym1102025211:2(252)Online publication date: 18-Feb-2019
  • (2017)Agentless and Uniform Introspection for Various Security Services in IaaS Cloud2017 4th International Conference on Information Science and Control Engineering (ICISCE)10.1109/ICISCE.2017.39(140-144)Online publication date: Jul-2017
  • Show More Cited By

Index Terms

  1. Poster: Exploring Security as a Service for IoT Enabled Remote Application Framework

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        MobiSys '16 Companion: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion
        June 2016
        172 pages
        ISBN:9781450344166
        DOI:10.1145/2938559
        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Sponsors

        In-Cooperation

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 25 June 2016

        Check for updates

        Author Tags

        1. internet of service
        2. internet of things
        3. remote application framework
        4. security as a service

        Qualifiers

        • Poster

        Funding Sources

        • Information Technology Research Academy (ITRA) Government of India

        Conference

        MobiSys'16
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 274 of 1,679 submissions, 16%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 15 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Research on Artificial Intelligence Enhancing Internet of Things Security: A SurveyIEEE Access10.1109/ACCESS.2020.30181708(153826-153848)Online publication date: 2020
        • (2019)Tenant-Oriented Monitoring for Customized Security Services in the CloudSymmetry10.3390/sym1102025211:2(252)Online publication date: 18-Feb-2019
        • (2017)Agentless and Uniform Introspection for Various Security Services in IaaS Cloud2017 4th International Conference on Information Science and Control Engineering (ICISCE)10.1109/ICISCE.2017.39(140-144)Online publication date: Jul-2017
        • (2017)Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine IntrospectionSecurity, Privacy, and Anonymity in Computation, Communication, and Storage10.1007/978-3-319-72389-1_41(516-529)Online publication date: 7-Dec-2017

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media