Nothing Special   »   [go: up one dir, main page]

Heins, 2023 - Google Patents

Trusted Cellular IoT Devices: Design Ingredients and Concepts

Heins, 2023

Document ID
14745539524690612016
Author
Heins K
Publication year

External Links

Snippet

On this planet, everybody understands the value of trust. In fact, trust is a major prerequisite for every successful cooperation and provides mutual confidence that expectations will be met by the other party. Trust might be based on prior experience or evidence, or it is just a …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Jurcut et al. Security considerations for Internet of Things: A survey
Sookhak et al. Security and privacy of smart cities: a survey, research issues and challenges
Kalogridis et al. Toward unified security and privacy protection for smart meter networks
Trèek An integral framework for information systems security management
CN109792386A (en) Method and apparatus for trust computing
Salim Cyber safety: A systems thinking and systems theory approach to managing cyber security risks
US7194759B1 (en) Used trusted co-servers to enhance security of web interaction
CN107209838A (en) Portable security device
Sujatha et al. Cyber Security Applications for Industry 4.0
Valadares et al. Formal verification of a trusted execution environment-based architecture for IoT applications
Rani et al. A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records
Heins Trusted Cellular IoT Devices: Design Ingredients and Concepts
Hernández-Ardieta et al. Enhancing the reliability of digital signatures as non-repudiation evidence under a holistic threat model
Quint et al. Secure authentication in CPS-based production environments
Zafir et al. Enhancing security of internet of robotic things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques
Rull Aixa Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach
Dhondge Lifecycle IoT Security for Engineers
Wu et al. Proof-carrying sensing: towards real-world authentication in cyber-physical systems
Heins Challenges and Objectives
Mihailescu et al. Cryptanalysis Attacks and Techniques
Flikkema et al. When things are sensors for cloud AI: Protecting privacy through data collection transparency in the age of digital assistants
Sun et al. On the Development of a Protection Profile Module for Encryption Key Management Components
Rodriguez et al. Dynamic Security and Privacy Seal Model Analysis
Farao Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance
Camek et al. Providing security to a smart grid prosumer system based on a service oriented architecture in an office environment