Proceedings of the International Conference on Management of Emergent Digital EcoSystems 2012
DOI: 10.1145/2457276.2457291
|View full text |Cite
|
Sign up to set email alerts
|

Metrics driven security management framework for e-health digital ecosystem focusing on chronic diseases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…Therefore, they examine associations to derive more secure metrics. In contrast to the above-mentioned practical solutions (e.g., [45][46][47][48][49][50][51][52][53][54][55][56][57]), which take into consideration only the structural aspects of the system, the authors conclude that a potential metric can be assumed good or bad based also on the attacker model.…”
Section: Quantifying Securitymentioning
confidence: 94%
See 1 more Smart Citation
“…Therefore, they examine associations to derive more secure metrics. In contrast to the above-mentioned practical solutions (e.g., [45][46][47][48][49][50][51][52][53][54][55][56][57]), which take into consideration only the structural aspects of the system, the authors conclude that a potential metric can be assumed good or bad based also on the attacker model.…”
Section: Quantifying Securitymentioning
confidence: 94%
“…The goal is to administrate responses to attackers' probes, so as to induce an external view of the system that complies with specific desirable properties. Minimizing the cost for the defender is also considered the study in [57] presents a multi-metric-driven management framework for e-health digital environments. The method is applied in e-health settings for chronic diseases and utilizes three metric categories.…”
Section: Quantifying Securitymentioning
confidence: 99%
“…Over time, several solutions have been proposed that try to resolve the open issues of capturing the security posture of an IoT or other system and facilitate its administration [76][77][78][79][80]. Eby et al [76] integrated the Simple Modeling Language for Embedded Systems (SMoLES) with the Security Model Analysis Language (SMAL) [76].…”
Section: Relevant Methodologies For Secure Iot Modelingmentioning
confidence: 99%
“…Savola and Sihvonen [80] propose a MTD approach based on a multi-metric-driven management framework. The overall solution has been applied in an e-health digital environment for chronic diseases [80], where three metric types are considered.…”
Section: Relevant Methodologies For Secure Iot Modelingmentioning
confidence: 99%
See 1 more Smart Citation