[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Singh et al., 2015 - Google Patents

Twenty security considerations for cloud-supported Internet of Things

Singh et al., 2015

View PDF
Document ID
4838904704475929344
Author
Singh J
Pasquier T
Bacon J
Ko H
Eyers D
Publication year
Publication venue
IEEE Internet of things Journal

External Links

Snippet

To realize the broad vision of pervasive computing, underpinned by the “Internet of Things”(IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT …
Continue reading at dash.harvard.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Similar Documents

Publication Publication Date Title
Singh et al. Twenty security considerations for cloud-supported Internet of Things
Ali et al. Multi-access edge computing architecture, data security and privacy: A review
Jurcut et al. Security considerations for Internet of Things: A survey
Iqbal et al. An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
Gebremichael et al. Security and privacy in the industrial internet of things: Current standards and future challenges
Wazid et al. Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap
Arfaoui et al. A security architecture for 5G networks
Liu et al. A survey on secure data analytics in edge computing
Jurcut et al. Introduction to IoT security
Seliem et al. Towards privacy preserving iot environments: a survey
Oh et al. Security requirements analysis for the IoT
Sicari et al. Security, privacy and trust in Internet of Things: The road ahead
Tuna et al. A survey on information security threats and solutions for Machine to Machine (M2M) communications
Rahouti et al. Secure software-defined networking communication systems for smart cities: Current status, challenges, and trends
Popescul et al. Data security in smart cities: challenges and solutions
Thabit et al. Cryptography algorithms for enhancing IoT security
Singh et al. Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things
Rizzardi et al. Securing the access control policies to the Internet of Things resources through permissioned blockchain
Jabraeil Jamali et al. IoT security
Ullrich et al. Network-based secret communication in clouds: A survey
Bhattacharjya et al. Present scenarios of IoT projects with security aspects focused
Zhang et al. Overview of IoT security architecture
Muzammal et al. A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology
Moussaid et al. Enhance the security properties and information flow control
Pešić et al. CAAVI-RICS model for observing the security of distributed IoT and edge computing systems