2018 IEEE 4th World Forum on Internet of Things (WF-IoT) 2018
DOI: 10.1109/wf-iot.2018.8355214
|View full text |Cite
|
Sign up to set email alerts
|

Ontology-based automation of security guidelines for smart homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 9 publications
0
4
0
1
Order By: Relevance
“…This study proposes a security guideline methodology that can be applied to all general products. Studies [23][24][25] have been conducted on the establishment of various security guidelines in addition to those for evaluation and certification. A study [23] determined that the key causes of data security breaches in the medical industry include human error and malicious result reporting.…”
Section: Studies On the Formulation Of Security Guidelinesmentioning
confidence: 99%
See 1 more Smart Citation
“…This study proposes a security guideline methodology that can be applied to all general products. Studies [23][24][25] have been conducted on the establishment of various security guidelines in addition to those for evaluation and certification. A study [23] determined that the key causes of data security breaches in the medical industry include human error and malicious result reporting.…”
Section: Studies On the Formulation Of Security Guidelinesmentioning
confidence: 99%
“…In that study, the advantages and disadvantages of existing information security guidelines were compared, and an effective information security awareness program for organizations was developed to provide efficient security education. Another study [24] developed a context-based ontology to establish security guidelines to increase the interoperability and mutual interests between smart-home providers, users, and smart devices. Here, the cases were divided as follows: one wherein security management is performed automatically without the user's involvement, and another wherein the user manages security according to the guidelines.…”
Section: Studies On the Formulation Of Security Guidelinesmentioning
confidence: 99%
“…Moreover, the results of using ontology in speech-based user interfaces have been very promising. According to studies in the field of smart homes, the ontology has been mostly used in the field of energy management (Saba et al 2018;Saba et al 2021) and in designing smart home models (Khan and Ndubuaku 2018;Reedoy et al 2021). In (Milward and Beveridge 2003), the speech recognition complexity in breast cancer detection tools has been decreased by exploiting the ontology as a question/answer system.…”
Section: Related Workmentioning
confidence: 99%
“…Khan et al [25] proposes an ontology that allows establishing security guidelines for interoperability and understanding between smart home actors. The authors indicate the security guidelines to be performed to exchange knowledge.…”
Section: Businessmentioning
confidence: 99%