2008 New Technologies, Mobility and Security 2008
DOI: 10.1109/ntms.2008.ecp.97
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling in Pervasive Computing Paradigm

Abstract: This paper presents the threat modeling approach for pervasive environment's security. In pervasive computing, a user might be part of various security domains at any particular instant of time having various authentication mechanisms and different privileges in different security domains. A number of threat modeling approaches and methods have been defined in literature and are in use. However, because of the nature of the pervasive computing and ubiquitous networks, these approaches do not handle the inheren… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 4 publications
(3 reference statements)
0
12
0
Order By: Relevance
“…This model (Fig. 5) presented as a new threat modeling to incorporate the problem of pervasive computing environment (Malik et al, 2008).…”
Section: Threat Model Framework and Methodology For Personal Networkmentioning
confidence: 99%
See 4 more Smart Citations
“…This model (Fig. 5) presented as a new threat modeling to incorporate the problem of pervasive computing environment (Malik et al, 2008).…”
Section: Threat Model Framework and Methodology For Personal Networkmentioning
confidence: 99%
“…2) (Malik et al, 2008). In the first step of this model, threat modeling has been addressed on the base of business objectives.…”
Section: Microsoft's Threat Analysis and Modeling (Tam)mentioning
confidence: 99%
See 3 more Smart Citations