作者: Vasily Desnitsky , Igor Kotenko
DOI: 10.1007/S12652-016-0371-6
关键词: Cloud computing 、 Internet access 、 Computer science 、 Embedded system 、 Cloud computing security 、 Security service 、 Computer security model 、 Component (UML) 、 Security testing 、 Identification (information)
摘要: The rising significance and widening of embedded systems stipulate the importance security means against a great deal computer threats. Such involving diversity an-hoc mobile electronic devices functioning with use broadband Internet access even cloud technologies, are referenced conventionally as Things (IoT). Due to specificity IoT application combined mechanisms requires their efficient energy computing resource consumption, identification potential conflicts incompatibilities, control information flows, monitoring anomalies data in system other issues. At that an increased design complexity is determined by low structuring formalization knowledge field. We proposed approach expert for its subsequent automated design, verification testing tools secure systems. paper encompasses core elements technique, namely component configuring, revelation implicit conflicts, network flows abnormal from sensors. domain specific analysis field described. also present revealed used configuration, devices. Issues software implementation discussion covered.