Vis enkel innførsel

dc.contributor.authorShrestha, Manish
dc.contributor.authorJohansen, Christian
dc.contributor.authorNoll, Josef
dc.date.accessioned2022-02-14T09:23:01Z
dc.date.available2022-02-14T09:23:01Z
dc.date.created2022-02-11T10:11:04Z
dc.date.issued2020
dc.identifier.isbn978-1-7281-7216-3
dc.identifier.urihttps://hdl.handle.net/11250/2978651
dc.description.abstractThe proliferation of IoT (Internet of Things) though making life easier, comes with security and privacy challenges. We have previously proposed a security classification methodology meant to help in practice build IoT systems focused on security during the development process. This method departs from classical risk analysis and certification methods in two ways: (i) it can be used at design time and (ii) it caters for the needs of system designers by helping them to identify protection mechanisms necessary for the connectivity required by their system under development. However, similarly to many risk analysis methods, this methodology was unable to provide assurance in the evaluation results. In this paper, we add two confidence parameters: belief and uncertainty to the assessment tree of arguments of a class. Thus, the final result is now a tuple <; C, B, U>, where C is the class to which the system belongs, together with a belief measure B in the evaluation aspects of C, and the uncertainty U in the evaluation details. Looking at the confidence parameters tells how well the security assessment is justified. To exemplify this enhanced security classification methodology, we systematically apply it to control mechanisms for Smart Home Energy Management Systems.en_US
dc.language.isoengen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.ispartofInternational Conference on Fog and Mobile Edge Computing (FMEC)
dc.titleBuilding Confidence using Beliefs and Arguments in Security Class Evaluations for IoTen_US
dc.typeChapteren_US
dc.description.versionacceptedVersionen_US
dc.rights.holder© IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.source.pagenumber244-249en_US
dc.identifier.doi10.1109/FMEC49853.2020.9144957
dc.identifier.cristin2000336
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel