[HTML][HTML] System security assurance: A systematic literature review

A Shukla, B Katt, LO Nweke, PK Yeng… - Computer Science …, 2022 - Elsevier
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …

IIoT System Canvas—From architecture patterns towards an IIoT development framework

MC May, D Glatter, D Arnold, D Pfeffer… - Journal of Manufacturing …, 2024 - Elsevier
Abstract Industrial Internet of Things (IIoT) solutions are poised to enable digital
transformation across industry verticals. However, the diversity of IIoT applications has …

Automatic whitelist generation system for ethernet based in-vehicle network

W Jo, SJ Kim, H Kim, Y Shin, T Shon - Computers in Industry, 2022 - Elsevier
Owing to the development of industrial internet of things (IIoT) technology, the connectivity
and complexity of vehicles have also increased, and new communication technologies have …

From trustworthy data to trustworthy IoT: A data collection methodology based on blockchain

CA Ardagna, R Asal, E Damiani, NE Ioini… - ACM Transactions on …, 2020 - dl.acm.org
Internet of Things (IoT) is composed of physical devices, communication networks, and
services provided by edge systems and over-the-top applications. IoT connects billions of …

SYNAPSE-An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness …

P Bountakas, K Fysarakis, T Kyriakakis… - Proceedings of the 19th …, 2024 - dl.acm.org
In an era of escalating cyber threats, the imperative for robust and comprehensive
cybersecurity measures has never been more pressing. To address this challenge …

A quantitative framework for security assurance evaluation and selection of cloud services: a case study

A Shukla, B Katt, MM Yamin - International Journal of Information Security, 2023 - Springer
Due to the high adoption of cloud services, the protection of data and information is critical.
Cloud service customers (CSCs) need help to obtain the authoritative assurances required …

Trustworthy iot: An evidence collection approach based on smart contracts

CA Ardagna, R Asal, E Damiani… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Today, Internet of Things (IoT) implements an ecosystem where a panoply of interconnected
devices collect data from physical environments and supply them to processing services, on …

IntellIoT: intelligent IoT environments

A Bröring, V Kulkarni, A Zirkler, P Buschmann… - Global IoT Summit, 2022 - Springer
Traditional IoT setups are cloud-centric and typically focused around a centralized IoT
platform to which data is uploaded for further processing. Next generation IoT applications …

A trust assurance technique for Internet of things based on human behavior compliance

M Anisetti, CA Ardagna, E Damiani… - … Practice and Experience, 2021 - Wiley Online Library
The advent of the Internet of things (IoT) has radically changed the way in which
computations and communications are carried out. People are just becoming another …

Security Assurance in Modern IoT Systems

N Bena, R Bondaruc, A Polimeno - 2022 IEEE 95th Vehicular …, 2022 - ieeexplore.ieee.org
Modern distributed systems consist of a multilayer architecture of IoT, edge, and cloud
nodes. Together, they are revolutionizing our lives, bringing intelligence to existing …