Security Patterns for Capturing Encryption-Based Access Control to Sensor Data - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2008

Security Patterns for Capturing Encryption-Based Access Control to Sensor Data

Résumé

A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper describes a generic solution that ensures end-to-end access control for data generated by wireless sensors and consumed by business applications, based on a new approach for encryption-based access control. The existing security mechanism is captured as Serenity (“System Engineering for Security and Dependability”) security patterns that describe a security problem and its solution in an abstract way. The structured description makes the security solution better understandable for non-security experts and helps to disseminate the security knowledge among application developers.

Dates et versions

hal-01511047 , version 1 (20-04-2017)

Identifiants

Citer

Angel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube. Security Patterns for Capturing Encryption-Based Access Control to Sensor Data. Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE'08), Aug 2008, Cap Esterel, France. pp.62-67, ⟨10.1109/SECURWARE.2008.17⟩. ⟨hal-01511047⟩
102 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More