2012 Complexity in Engineering (COMPENG). Proceedings 2012
DOI: 10.1109/compeng.2012.6242962
|View full text |Cite
|
Sign up to set email alerts
|

The SHIELD framework: How to control Security, Privacy and Dependability in complex systems

Abstract: The purpose of this paper is to present the SHIELD holistic approach: an innovative methodology to address Security, Privacy and Dependability (SPD) in the context of Embedded Systems (ES) by means of control science theory. The SHIELD methodology consider the SPD functionalities offered by the generic atomic component of a complex system at 3 different levels: node, network and middleware. Then these technologies are enhanced with a fourth vertical layer named overlay that provides composability functionality… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 4 publications
0
17
0
Order By: Relevance
“…The COMP module grants the off-line security by means of two functionalities. First it quantifies the current CI security level according to properly defined metrics; second, given the potential threats and countermeasures, it computes the optimal CI configuration to assure a desired, static, security level, exploiting the approach of composable security introduced in [25,26].…”
Section: Composermentioning
confidence: 99%
“…The COMP module grants the off-line security by means of two functionalities. First it quantifies the current CI security level according to properly defined metrics; second, given the potential threats and countermeasures, it computes the optimal CI configuration to assure a desired, static, security level, exploiting the approach of composable security introduced in [25,26].…”
Section: Composermentioning
confidence: 99%
“…Validation of the concepts developed within the nSHIELD project will be demonstrated by the means of four independent scenarios/demonstrators: For page limitation purposes, we are omitting a more detailed outlook on the demonstrators, and the project's ideas and methodologies as a whole. These may, however, be found at (nSHIELD Consortium, 2012), (Fiaschetti et al, 2012), (Esposito et al, 2013), (Flammini et al, 2011). The focus is instead placed on the implementational details of the SPD-driven Smart Transmission Layer, and the corresponding test bed architecture, discussed in more detail in the next section.…”
Section: Nshield -Application Of Security Privacy and Dependability mentioning
confidence: 99%
“…The challenge at this point is, whenever general data, such as status information or location information, is combined with sensitive information like personal data, this new individual driving data cluster becomes sensitive as well. In other words, an increase in data complexity also results in an increase in security complexity [1]. In order to protect these clusters, new security classes need to be determined based upon the need for secure storage, access control, and required protection level.…”
Section: Introductionmentioning
confidence: 99%