Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments
暂无分享,去创建一个
Sotiris Ioannidis | George Spanoudakis | George Hatzivasilis | Konstantinos Fysarakis | Othonas Soultatos | Manos Papoutsakis | Manos Michalodimitrakis | G. Spanoudakis | George Hatzivasilis | Konstantinos Fysarakis | S. Ioannidis | Othonas Soultatos | Manos Papoutsakis | M. Michalodimitrakis
[1] J-C. Laprie,et al. DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..
[2] Lukács Adrienn,et al. What is Privacy? The History and Definition of Privacy , 2016 .
[3] Charles L. Forgy,et al. Rete: A Fast Algorithm for the Many Patterns/Many Objects Match Problem , 1982, Artif. Intell..
[4] Markus Schumacher,et al. Security Engineering with Patterns: Origins, Theoretical Models, and New Applications , 2003 .
[5] Ioannis G. Askoxylakis,et al. Fault Tolerance Using an SDN Pattern Framework , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[6] Markus Schumacher,et al. Security Engineering with Patterns , 2003, Lecture Notes in Computer Science.
[7] Charles L. Forgy,et al. Rete: a fast algorithm for the many pattern/many object pattern match problem , 1991 .
[8] Gian Luigi Ferrari,et al. Semantics-Based Design for Secure Web Services , 2008, IEEE Transactions on Software Engineering.
[9] George Spanoudakis,et al. Architectural Patterns for Secure IoT Orchestrations , 2019, 2019 Global IoT Summit (GIoTS).
[10] Ioannis G. Askoxylakis,et al. RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems , 2015, HCI.
[11] Ioannis Papaefstathiou,et al. Policy-based access control for DPWS-enabled ubiquitous devices , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).
[12] Charalampos Manifavas,et al. Secure policy-based management solutions in heterogeneous embedded systems networks , 2012, 2012 International Conference on Telecommunications and Multimedia (TEMU).
[13] Ernesto Damiani,et al. Extensions to pattern formats for cyber physical systems , 2014 .
[14] Ioannis G. Askoxylakis,et al. The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0 , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[15] Gregory D. Abowd,et al. Formalizing style to understand descriptions of software architecture , 1995, TSEM.
[16] Jing Dong,et al. Automated verification of security pattern compositions , 2010, Inf. Softw. Technol..
[17] Manachai Toahchoodee,et al. Verification and Trade-Off Analysis of Security Properties in UML System Models , 2010, IEEE Transactions on Software Engineering.
[18] George Spanoudakis,et al. Pattern-Based Design and Verification of Secure Service Compositions , 2020, IEEE Transactions on Services Computing.
[19] Ioannis G. Askoxylakis,et al. The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network , 2018, Comput. Commun..
[20] Eduardo B. Fernández,et al. A Pattern-Driven Security Process for SOA Applications , 2008, ARES.
[21] Jan Jürjens,et al. Sound development of secure service-based systems , 2004, ICSOC '04.
[22] Michelle Finneran Dennedy,et al. The Privacy Engineers Manifesto: Getting from Policy to Code to QA to Value , 2014 .