Security Patterns for Capturing Encryption-Based Access Control to Sensor Data

  • Authors:
  • Angel Cuevas;Paul El Khoury;Laurent Gomez;Annett Laube

  • Affiliations:
  • -;-;-;-

  • Venue:
  • SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper describes a generic solution that ensures end-to-end access control for data generated by wireless sensors and consumed by business applications, based on a new approach for encryption-based access control. The existing security mechanism is captured as Serenity ("System Engineering for Security and Dependability") security patterns that describe a security problem and its solution in an abstract way. The structured description makes the security solution better understandable for non-security experts and helps to disseminate the security knowledge among application developers.