In this paper, we show how to derive formal spec- ifications of secure IoT systems by a process that uses the risk assessment strategy of attack trees on infrastructure models. The models of the infrastructure are logical models in the Isabelle Infrastructure framework. It comprises actors, policies and a state transition of the dynamic evolution of the system. This logical framework also provides attack trees. The process we propose in this paper incrementally uses those two features to refine a system specification until expected security and privacy properties can be proved. Infrastructures allow modeling logical as well as physical elements which makes them well suited for IoT applications. We illustrate the stepwise application of the ...
This article describes the developing stands of typical IoT infrastructure Technologies, which are d...
The Internet of Things (IoT) has recently become one of the most relevant emerging technologies in t...
Preventing privacy-related risks in the creation of Trustworthy Smart IoT Systems (TSIS) will be ess...
In this paper, we integrate previously developed formal methods to model infrastructure, actors, and...
In this paper, we combine a framework for ethical requirement elicitation eFRIEND with automated rea...
In this paper, we show a security engineering process based on a formal notion of refinement fully f...
The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human ...
In this paper, we summarize a new approach to make security and privacy issues in the Internet of Th...
In this paper, we introduce a process of formal system development supported by interactive theorem ...
Ambient Assisted Living systems aim at providing automated support to humans with special needs. Sma...
The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human ...
International audienceThe control and protection of a user data is a very important aspect in the de...
LoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large...
The heterogeneity of Internet of Things (IoT) systems has so far prevented the definition of adequat...
The advent of Internet of Things (IoT) has escalated the information sharing among various smart dev...
This article describes the developing stands of typical IoT infrastructure Technologies, which are d...
The Internet of Things (IoT) has recently become one of the most relevant emerging technologies in t...
Preventing privacy-related risks in the creation of Trustworthy Smart IoT Systems (TSIS) will be ess...
In this paper, we integrate previously developed formal methods to model infrastructure, actors, and...
In this paper, we combine a framework for ethical requirement elicitation eFRIEND with automated rea...
In this paper, we show a security engineering process based on a formal notion of refinement fully f...
The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human ...
In this paper, we summarize a new approach to make security and privacy issues in the Internet of Th...
In this paper, we introduce a process of formal system development supported by interactive theorem ...
Ambient Assisted Living systems aim at providing automated support to humans with special needs. Sma...
The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human ...
International audienceThe control and protection of a user data is a very important aspect in the de...
LoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large...
The heterogeneity of Internet of Things (IoT) systems has so far prevented the definition of adequat...
The advent of Internet of Things (IoT) has escalated the information sharing among various smart dev...
This article describes the developing stands of typical IoT infrastructure Technologies, which are d...
The Internet of Things (IoT) has recently become one of the most relevant emerging technologies in t...
Preventing privacy-related risks in the creation of Trustworthy Smart IoT Systems (TSIS) will be ess...