Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs

We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then...

متن کامل

Symbolic Attributed Graphs for Attributed Graph Transformation

In this paper we present a new approach to deal with attributed graphs and attributed graph transformation. This approach is based on working with what we call symbolic graphs, which are graphs labelled with variables together with a formula that constrains the possible values that we may assign to these variables. In particular, in this paper we will compare in detail this new approach with th...

متن کامل

Borrowed Contexts for Attributed Graphs

Borrowed context graph transformation is a simple and powerful technique developed by Ehrig and König that allow us to derive labeled transitions and bisimulation congruences for graph transformation systems or, in general, for process calculi that can be defined in terms of graph transformation systems. Moreover, the same authors have also shown how to use this technique for the verification o...

متن کامل

Security Bootstrapping for Networked Devices

In this short paper I present twomechanisms to bootstrap security relations between networked devices: the ownership model and a security policy. The ownership model assures security relations between devices owned by the same user, and the security policy defines security relations to other devices, assigns rights to relations, and supports authentic key exchange.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2016

ISSN: 1424-8220

DOI: 10.3390/s16050674