Proceedings of the 4th ACM Workshop on Cyber-Physical System Security 2018
DOI: 10.1145/3198458.3198463
|View full text |Cite
|
Sign up to set email alerts
|

Too Long, did not Enforce

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 19 publications
0
1
0
1
Order By: Relevance
“…Las utilidades de la seguridad basada en el riesgo son tan variadas como las de seguridad adaptativa, y en muchos casos solapan. Destacan el control de accesos (como [15] en IoT) o la toma de decisiones ( [16] para el enrutamiento en SDN).…”
Section: Ii-a Controles Dinámicos Y Seguridad Adaptativaunclassified
“…Las utilidades de la seguridad basada en el riesgo son tan variadas como las de seguridad adaptativa, y en muchos casos solapan. Destacan el control de accesos (como [15] en IoT) o la toma de decisiones ( [16] para el enrutamiento en SDN).…”
Section: Ii-a Controles Dinámicos Y Seguridad Adaptativaunclassified
“…Utilization of such methodologies can also be found in the information security domain, providing solutions mainly related to the risk assessment procedure of the organizations' assets [20][21][22][23][24], while no work relevant to security policy-based management has been identified in the literature. A relevant work was also presented earlier by the authors in [25]. However, that study makes use of AHP and does not consider the additional limitations arising in highly dynamic and constrained environments.…”
Section: Related Workmentioning
confidence: 99%