[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sicari et al., 2016 - Google Patents

Security policy enforcement for networked smart objects

Sicari et al., 2016

View PDF
Document ID
16624812854548843214
Author
Sicari S
Rizzardi A
Miorandi D
Cappiello C
Coen-Porisini A
Publication year
Publication venue
Computer Networks

External Links

Snippet

Abstract In the Internet of Things (IoT) heterogeneous technologies concur to the provisioning of customized services able to bridge the gap between the physical and digital realms. Security, privacy and data quality are acknowledged to represent key issues to be …
Continue reading at re.public.polimi.it (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Similar Documents

Publication Publication Date Title
Sicari et al. Security policy enforcement for networked smart objects
Lee et al. A Survey on Standards for Interoperability and Security in the Internet of Things
Ravidas et al. Access control in Internet-of-Things: A survey
Ouaddah et al. Access control in the Internet of Things: Big challenges and new opportunities
Sicari et al. A secure and quality-aware prototypical architecture for the Internet of Things
Molina Zarca et al. Semantic-aware security orchestration in SDN/NFV-enabled IoT systems
Mathijssen et al. Identification of practices and capabilities in API management: a systematic literature review
Abbasi et al. A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IoTs
Sylla et al. Towards a context-aware security and privacy as a service in the internet of things
Um et al. Strengthening trust in the future social-cyber-physical infrastructure: an ITU-T perspective
Ahmad et al. Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
Abwnawar A policy-based management approach to security in cloud systems.
Kuzminykh et al. Analysis of assets for threat risk model in avatar-oriented IoT architecture
Koorapati et al. Towards a unified ontology for IoT fabric with SDDC
Agrawal et al. Policy technologies for self-managing systems
Hariri et al. UCON+: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization
Laborde et al. A situation-driven framework for dynamic security management
Thanh et al. VISECO: An annotated security management framework for 5G
Pérez et al. Semantic-based authorization architecture for grid
Sadi Assisting with API design through reusing design knowledge
Alulema et al. A Cross-Device Architecture for Modelling Authentication Features in IoT Applications.
Bagüés et al. Enabling Personal Privacy for Pervasive Computing Environments.
Astropekakis et al. A Survey of IoT Software Platforms
Tan et al. A semantic approach to harmonizing security models for open services
Sukmana et al. A brokerage approach for secure multi-cloud storage resource management