2019 Global IoT Summit (GIoTS) 2019
DOI: 10.1109/giots.2019.8766425
|View full text |Cite
|
Sign up to set email alerts
|

Architectural Patterns for Secure IoT Orchestrations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…IoT generates valuable information [15] and opportunities that governments can use to make their services better and more efficient for citizens. IoT service orchestration is a term used to explain the integration of separate systems, software, and sensors into a single service management platform [17], [18]. This service orchestration offers the ability to integrate IoT with existing business workflows and systems [19] such as public service systems.…”
Section: Introductionmentioning
confidence: 99%
“…IoT generates valuable information [15] and opportunities that governments can use to make their services better and more efficient for citizens. IoT service orchestration is a term used to explain the integration of separate systems, software, and sensors into a single service management platform [17], [18]. This service orchestration offers the ability to integrate IoT with existing business workflows and systems [19] such as public service systems.…”
Section: Introductionmentioning
confidence: 99%
“…They specify appropriate countermeasures for mitigating it, contributing to a specific problem in many IoT systems. Paper Fysarakis et al (2019) discusses a pattern-driven framework solution to encode dependencies between the security concerns mentioned in "Security and privacy concerns" section. More specifically, paper Fysarakis et al (2019) presents orchestration models required for IoT and IIoT applications to guarantee quality properties including security, privacy.…”
Section: Answering Rq22 How Well Do the Patterns And Architectures Co...mentioning
confidence: 99%
“…A number of network components are deployed in 5Genabled infrastructure where the LCA can be collected based on the multiagent approach proposed previously. To evaluate this approach, suitable, tree-based network topologies are created by the enforcement of additional architectural pattern rules [15]. The topology consists of a master node interconnected with a number of routers.…”
Section: ) Multidomain Lca Monitoring That Enables Predictive Circulmentioning
confidence: 99%