Challenges and opportunities for conducting dynamic risk assessments in medical IoT

RM Czekster, P Grace, C Marcon, F Hessel… - Applied Sciences, 2023 - mdpi.com
Modern medical devices connected to public and private networks require additional layers
of communication and management to effectively and securely treat remote patients …

[HTML][HTML] A privacy-preserving attribute-based framework for IoT identity lifecycle management

J García-Rodríguez, A Skarmeta - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) has brought a new era of interconnected devices and
seamless data exchange. As the IoT ecosystem continues to expand, there is an increasing …

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity

T Dayaratne, X Fan, Y Liu, C Rudolph - arXiv preprint arXiv:2405.02476, 2024 - arxiv.org
The emerging Self-Sovereign Identity (SSI) techniques, such as Decentralized Identifiers
(DIDs) and Verifiable Credentials (VCs), move control of digital identity from conventional …

NIST Cybersecurity for IoT Program

K Megas, B Cuthill, M Fagan, P Watrobski - Computer, 2024 - ieeexplore.ieee.org
NIST Cybersecurity for IoT Program Page 1 144 COMPUTER PUBLISHED BY THE IEEE
COMPUTER SOCIETY US Government work not protected by US copyright. The National …

Formal Security of Zero Trust Architectures

A Poirrier - 2024 - theses.hal.science
The security architecture of Information Technology (IT) systems has traditionally been
based on the perimeter security model, in which resources are grouped into perimeters …