Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
MLS security policy evolution with genetic programming
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
Automating role-based provisioning by learning from examples
Proceedings of the 14th ACM symposium on Access control models and technologies
Ubiquitous Computing: Smart Devices, Environments and Interactions
Ubiquitous Computing: Smart Devices, Environments and Interactions
Risk-based access control systems built on fuzzy inferences
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mapping between classical risk management and game theoretical approaches
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Securing the Internet of Things
Computer
Security in the Internet of Things: A Review
ICCSEE '12 Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering - Volume 03
Adaptive security and privacy management for the internet of things (ASPI 2013)
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
A testbed for adaptive security for IoT in eHealth
Proceedings of the International Workshop on Adaptive Security
Proceedings of the International Workshop on Adaptive Security
Hi-index | 0.00 |
Emerging Internet of Things (IoTs) technologies provide many benefits to the improvement of eHealth. The successful deployment of IoTs depends on ensuring security and privacy that need to adapt to their processing capabilities and resource use. IoTs are vulnerable to attacks since communications are mostly wireless, unattended things are usually vulnerable to physical attacks, and most IoT components are constrained by energy, communications, and computation capabilities necessary for the implementation of complex security-supporting schemes. This paper describes a risk-based adaptive security framework for IoTs in eHealth that will estimate and predict risk damages and future benefits using game theory and context-awareness techniques. The paper also describes the validation case study.