作者: Sachin Babar , Antonietta Stango , Neeli Prasad , Jaydip Sen , Ramjee Prasad
DOI: 10.1109/WIRELESSVITAE.2011.5940923
关键词: Computer science 、 Asset (computer security) 、 Security service 、 Computer security 、 Cloud computing security 、 Security through obscurity 、 Security engineering 、 Software security assurance 、 Computer security model 、 Security information and event management
摘要: … analysis, the paper defines the security needs taking into account … Finally, this paper proposes an embedded security … the embedded security frameworN for IoT, we also need to looN at …