Protecting the Internet of Things with Security-by-Contract and Fog Computing.
Alberto GiarettaNicola DragoniFabio MassacciPublished in: WF-IoT (2019)
Keyphrases
- smart objects
- access control
- ubiquitous computing
- information security
- security requirements
- security policies
- network security
- intrusion detection
- security issues
- supply chain
- statistical databases
- single image
- functional requirements
- information systems
- privacy preservation
- security analysis
- contractual obligations