IoT Security Configurability with Security-by-Contract.
Alberto GiarettaNicola DragoniFabio MassacciPublished in: Sensors (2019)
Keyphrases
- security problems
- security requirements
- security issues
- access control
- intrusion detection
- key management
- information assurance
- information security
- functional requirements
- computer security
- security policies
- network security
- security level
- network management
- cyber security
- data security
- security model
- security threats
- database systems