首页> 外文期刊>ACM Computing Surveys >Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design
【24h】

Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design

机译:应用于IOT,云和移动生态系统的攻击和系统建模:通过设计嵌入安全性

获取原文
获取原文并翻译 | 示例
           

摘要

Over the years, pervasive computing and communication technologies have enabled the emergence of new computing paradigms that have gained importance across a wide spectrum of domains. The three most notable that have witnessed significant advancements and have a solid track record of exponential growth in diverse applications are the Internet of Things (loT), Cloud, and Mobile Computing. The ubiquity of these paradigms, their expandability, and applicability in different problem spaces have made them invaluable in modern computing solutions. Security becomes a real concern, especially when it comes to the development of applications in these environments, as numerous security issues may arise from potential design flaws. Secure application development across these three technologies can only be achieved when applications and systems are designed and developed with security in mind. This will improve the quality of the solutions and ensure that vulnerabilities are identified. It will also help in defining countermeasures against cyberattacks or mitigate the effects of potential threats to the systems. This article surveys existing approaches, tools, and techniques for attack and system modeling applicable to IoT, Cloud computing, and Mobile Computing. It also evaluates the strengths and limitations of the reviewed approaches and tools, from which it highlights the main existing challenges and open issues in the area.
机译:多年来,普遍的计算和通信技术使得能够出现新的计算范式,这些基调在广泛的域中获得了重要性。目睹了重要进步的三个最值得注意的是不同应用中的指数增长的坚实轨道记录是事物(地段),云和移动计算的互联网。在不同问题空间中,这些范式的泛滥,它们的可扩展性和适用性使它们在现代计算解决方案中使其非常宝贵。安全成为一个真正的关注点,特别是当涉及到这些环境中的应用程序的发展时,可能出现来自潜在设计缺陷的许多安全问题。只有在设计和开发的安全性时,才能实现这三种技术的安全应用程序开发。这将提高解决方案的质量,并确保确定漏洞。它还有助于定义对抗网络攻击的对策或减轻潜在威胁对系统的影响。本文调查适用于IOT,云计算和移动计算的攻击和系统建模的现有方法,工具和技术。它还评估了审查的方法和工具的优势和局限,从中强调了该地区的主要挑战和开放问题。

著录项

  • 来源
    《ACM Computing Surveys》 |2021年第2期|25.1-25.32|共32页
  • 作者单位

    Univ Beira Interior Dept Informat Rua Marques Avila & Bolama P-6201001 Covilha Portugal|Inst Telecomunicacoes Covilha Portugal;

    Univ Beira Interior Dept Informat Rua Marques Avila & Bolama P-6201001 Covilha Portugal|Inst Telecomunicacoes Covilha Portugal;

    Univ Beira Interior Dept Informat Rua Marques Avila & Bolama P-6201001 Covilha Portugal|Inst Telecomunicacoes Covilha Portugal;

    Univ Beira Interior Dept Informat Rua Marques Avila & Bolama P-6201001 Covilha Portugal|Inst Telecomunicacoes Covilha Portugal;

    Univ Beira Interior Dept Informat Rua Marques Avila & Bolama P-6201001 Covilha Portugal|Inst Telecomunicacoes Covilha Portugal;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    IoT; Cloud computing; Mobile computing; system modeling; attack modeling; security; survey;

    机译:IOT;云计算;移动计算;系统建模;攻击建模;安全;调查;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号