Towards Run-Time Verification of Adaptive Security for IoT in eHealth.
Arild B. TorjusenHabtamu AbieEbenezer PaintsilDenis TrcekÅsmund SkomedalPublished in: ECSA Workshops (2014)
Keyphrases
- security problems
- high security
- intrusion detection
- cryptographic protocols
- integrity verification
- java card
- information security
- management system
- security issues
- key management
- model checking
- cloud computing
- network security
- security requirements
- security analysis
- rfid systems
- biometric systems
- authentication protocol
- security mechanisms
- neural network
- statistical databases
- computer networks
- information sharing
- access control
- information systems