Final Architecture Specification of security, privacy, and incentive mechanisms

نویسندگان

  • Nicolai Kuntze
  • Jürgen Repp
  • Hervais Simo Fhom
  • Andreas Fuchs
  • Ine-Saf Benaissa
چکیده

In this document, we define the NADA security architecture based on refined use case scenarios, a derived high level model and security analysis. For the architecure design and verification we are applying the well known STRIDE model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Adjustment Mechanisms of Privacy in extroverted homes of Gilan (Case Study: Rural Homes)

Privacy as a human need, is the result of adjustment of the interaction between human environment, which under the influence of current patterns of activity and cultural background, leads to a favorable atmosphere. Adjusting the privacy in Iranian homes is one of the fundamental features of Iranian architecture, which has had a profound effect on the formation of the spatial organization and th...

متن کامل

Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications

Incentive mechanisms of crowdsensing have recently been intensively explored. Most of these mechanisms mainly focus on the standard economical goals like truthfulness and utility maximization. However, enormous privacy and security challenges need to be faced directly in real-life environments, such as cost privacies. In this paper, we investigate offline verifiable privacy-protection crowdsens...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Investigating Cross-Cultural Differences in the Privacy Regulation and Perception of Crowding (Northern and Kurdish Women in Iran)

This study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo Iranian sub-cultures (Kurdish and Northern women).The primary purpose of this study was to examine whether Northern and Kurdish women differed in their desired and achieved levels of privacy in parks. The second purpose of this study was to investigate the relationships between the d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0911.3343  شماره 

صفحات  -

تاریخ انتشار 2009