International audienceThe control and protection of a user data is a very important aspect in the design and deployment of the Internet of Things (IoT). In this paper we propose a security-based modelling language for IoT systems, which explicitly represents data access controls. The language leverages the analysis of potential security failures resulting from a series of interactions between heterogeneous components of a system. We implemented a tool that automatically transforms IoT models into BIP models, which can then be simulated and analyzed for security guarantees. We illustrate the features of our language with a use-case inspired by an industrial scenario
Trigger-Action platforms are systems that enable users to easily define, in terms of conditional rul...
The Internet of Things (IoT) is deeply changing our society. Daily we use smart devices that automa...
This article describes the developing stands of typical IoT infrastructure Technologies, which are d...
International audienceThe control and protection of a user data is a very important aspect in the de...
International audienceWe propose a security-based modeling language for IoT systems with two importa...
LoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large...
The heterogeneous nature of the Internet of Things (IoT) represents a big challenge in many differen...
Internet of Things (IoT) systems are ubiquitous, highly complex and dynamic event-based systems. The...
The heterogeneity of Internet of Things (IoT) systems has so far prevented the definition of adequat...
In this paper, we show how to derive formal spec- ifications of secure IoT systems by a process that...
We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the co...
Internet of Things (IoT) systems are ubiquitous, highly complex and dynamic event-based systems. The...
Internet of Things (IoT) systems are ubiquitous, highly complex and dynamic event-based systems. The...
Thispaperproposesaconceptualmodeltosupportdecisionmakersdur- ing security analysis of Internet of Th...
The Internet of Things (IoT) is enabling innovative applications in various domains. Due to its hete...
Trigger-Action platforms are systems that enable users to easily define, in terms of conditional rul...
The Internet of Things (IoT) is deeply changing our society. Daily we use smart devices that automa...
This article describes the developing stands of typical IoT infrastructure Technologies, which are d...
International audienceThe control and protection of a user data is a very important aspect in the de...
International audienceWe propose a security-based modeling language for IoT systems with two importa...
LoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large...
The heterogeneous nature of the Internet of Things (IoT) represents a big challenge in many differen...
Internet of Things (IoT) systems are ubiquitous, highly complex and dynamic event-based systems. The...
The heterogeneity of Internet of Things (IoT) systems has so far prevented the definition of adequat...
In this paper, we show how to derive formal spec- ifications of secure IoT systems by a process that...
We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the co...
Internet of Things (IoT) systems are ubiquitous, highly complex and dynamic event-based systems. The...
Internet of Things (IoT) systems are ubiquitous, highly complex and dynamic event-based systems. The...
Thispaperproposesaconceptualmodeltosupportdecisionmakersdur- ing security analysis of Internet of Th...
The Internet of Things (IoT) is enabling innovative applications in various domains. Due to its hete...
Trigger-Action platforms are systems that enable users to easily define, in terms of conditional rul...
The Internet of Things (IoT) is deeply changing our society. Daily we use smart devices that automa...
This article describes the developing stands of typical IoT infrastructure Technologies, which are d...