Sicari et al., 2016 - Google Patents
Security policy enforcement for networked smart objectsSicari et al., 2016
View PDF- Document ID
- 16624812854548843214
- Author
- Sicari S
- Rizzardi A
- Miorandi D
- Cappiello C
- Coen-Porisini A
- Publication year
- Publication venue
- Computer Networks
External Links
Snippet
Abstract In the Internet of Things (IoT) heterogeneous technologies concur to the provisioning of customized services able to bridge the gap between the physical and digital realms. Security, privacy and data quality are acknowledged to represent key issues to be …
- 230000003993 interaction 0 abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sicari et al. | Security policy enforcement for networked smart objects | |
Lee et al. | A Survey on Standards for Interoperability and Security in the Internet of Things | |
Ravidas et al. | Access control in Internet-of-Things: A survey | |
Ouaddah et al. | Access control in the Internet of Things: Big challenges and new opportunities | |
Sicari et al. | A secure and quality-aware prototypical architecture for the Internet of Things | |
Molina Zarca et al. | Semantic-aware security orchestration in SDN/NFV-enabled IoT systems | |
Mathijssen et al. | Identification of practices and capabilities in API management: a systematic literature review | |
Abbasi et al. | A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IoTs | |
Sylla et al. | Towards a context-aware security and privacy as a service in the internet of things | |
Um et al. | Strengthening trust in the future social-cyber-physical infrastructure: an ITU-T perspective | |
Ahmad et al. | Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system | |
Abwnawar | A policy-based management approach to security in cloud systems. | |
Kuzminykh et al. | Analysis of assets for threat risk model in avatar-oriented IoT architecture | |
Koorapati et al. | Towards a unified ontology for IoT fabric with SDDC | |
Agrawal et al. | Policy technologies for self-managing systems | |
Hariri et al. | UCON+: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization | |
Laborde et al. | A situation-driven framework for dynamic security management | |
Thanh et al. | VISECO: An annotated security management framework for 5G | |
Pérez et al. | Semantic-based authorization architecture for grid | |
Sadi | Assisting with API design through reusing design knowledge | |
Alulema et al. | A Cross-Device Architecture for Modelling Authentication Features in IoT Applications. | |
Bagüés et al. | Enabling Personal Privacy for Pervasive Computing Environments. | |
Astropekakis et al. | A Survey of IoT Software Platforms | |
Tan et al. | A semantic approach to harmonizing security models for open services | |
Sukmana et al. | A brokerage approach for secure multi-cloud storage resource management |