Security , Privacy & Trust in Internet of Things : the road ahead

@inproceedings{Sicari2015SecurityP,
  title={Security , Privacy & Trust in Internet of Things : the road ahead},
  author={Sabrina Sicari and Alessandra Rizzardi and Luigi Alfredo Grieco and Alberto Coen-Porisini},
  year={2015}
}
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in various application domains. In this scenario, the satisfaction of security and privacy requirements plays a fundamental role. Such requirements include data confidentiality and authentication, access control within the IoT network, privacy and trust among users and things, and the enforcement of security and privacy policies. Traditional security countermeasures… CONTINUE READING

Figures and Tables from this paper.

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 124 REFERENCES

A framework to enforce access control over data streams

B. Carminati, E. Ferrari, K. L. Tan
  • ACM Trans. Inform. Syst. Sec., TISSEC 13 (3)
  • 2010
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

A Security Punctuation Framework for Enforcing Access Control on Streaming Data

  • 2008 IEEE 24th International Conference on Data Engineering
  • 2008
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

A lightweight and secure TFTP protocol for smart environment

  • 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE)
  • 2012
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

A subjective model for trustworthiness evaluation in the social Internet of Things

  • 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC)
  • 2012
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Internet of things: Objectives and scientific challenges

H.-D. Ma
  • Journal of Computer Science and Technology 26 (6)
  • 2011
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

A NFP Model for Internet of Things applications

  • 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
  • 2014
VIEW 2 EXCERPTS