2018
DOI: 10.1007/978-3-030-03192-3_4
|View full text |Cite
|
Sign up to set email alerts
|

A Security Model for IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…In [12,13], we describe a first proof-of-concept prototype. This first prototype is based on (i) OWL2 ontologies for representing nodes, topics and events, (ii) SWRL [20] rules for representing the security policy, and (iii) an OWL2 [21] inference engine for computing a security decision (allow/ deny).…”
Section: Prototypementioning
confidence: 99%
See 3 more Smart Citations
“…In [12,13], we describe a first proof-of-concept prototype. This first prototype is based on (i) OWL2 ontologies for representing nodes, topics and events, (ii) SWRL [20] rules for representing the security policy, and (iii) an OWL2 [21] inference engine for computing a security decision (allow/ deny).…”
Section: Prototypementioning
confidence: 99%
“…Therefore, we can translate any security rule defined with our model into an SHACL shape/ rule. Instead of processing security rules with a generic rule reasoner as we did in our first prototype [12,13], we now translate our security rules into SHACL shapes/rules. We apply that these SHACL shapes/rules to RDF publication/ subscription requests to produce security decisions.…”
Section: Architecturementioning
confidence: 99%
See 2 more Smart Citations