SecureSafe: a highly secure online data safe industrial use case
Abstract
References
Index Terms
- SecureSafe: a highly secure online data safe industrial use case
Recommendations
Security Architecture of Computer Communication System Based on Internet of Things
ICASIT 2020: Proceedings of the 2020 International Conference on Aviation Safety and Information TechnologyIn large-scale service collaboration environment, security and privacy protection are the main factors affecting the development of IoT service applications. The security and privacy requirements of IoT services mainly focus on three aspects: secure ...
Multi-Tier Security Feature Modeling for Service-Oriented Application Integration
ICIS '09: Proceedings of the 2009 Eigth IEEE/ACIS International Conference on Computer and Information ScienceIn Service oriented architecture (SOA) environment, the communication and infrastructure security is crucial. The most important specification addressing web services security is WS-Security, which collaborates with the SOAP message specifications, ...
Securing the IP-based internet of things with HIP and DTLS
WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networksThe IP-based Internet of Things (IoT) refers to the pervasive interaction of smart devices and people enabling new applications by means of new IP protocols such as 6LoWPAN and CoAP. Security is a must, and for that we need a secure architecture in ...
Comments
Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigops
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 288Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in