Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments.
Othonas SoultatosManos PapoutsakisKonstantinos FysarakisGeorge HatzivasilisManos MichalodimitrakisGeorge SpanoudakisSotiris IoannidisPublished in: CAMAD (2019)
Keyphrases
- security issues
- management system
- security problems
- rfid systems
- security concerns
- statistical databases
- identity management
- information systems
- cloud computing
- security mechanisms
- data security
- personal data
- security threats
- security properties
- security management
- security risks
- security requirements
- policy enforcement
- information security
- rfid technology
- security and privacy issues
- access control
- preserving privacy
- key management
- privacy concerns
- network management
- protection mechanisms
- sensitive data
- high assurance
- privacy issues
- privacy requirements
- privacy preserving
- security services
- privacy enhancing
- data privacy
- electronic payment
- semantic web
- ambient intelligence
- biometric template
- information management
- data management
- security measures
- confidential information
- security protocols
- secure multiparty computation
- cryptographic protocols
- authentication protocol
- personal information
- knowledge management
- individual privacy
- security analysis
- private information
- security policies
- complex systems
- cyber attacks
- data integrity
- trusted third party
- privacy protection
- intrusion detection
- metadata