A model-driven approach to ensure trust in the IoT

D Ferraris, C Fernandez-Gago, J Lopez - Human-centric Computing and …, 2020 - Springer
Abstract The Internet of Things (IoT) is a paradigm that permits smart entities to be
interconnected anywhere and anyhow. IoT opens new opportunities but also rises new …

Modelling compliance risk: a structured approach

S Esayas, T Mahler - Artificial Intelligence and Law, 2015 - Springer
This article presents a structured and systematic approach for identifying and modelling
compliance risks. The sophistication with which modern business is carried out and the …

Legal issues in clouds: towards a risk inventory

K Djemame, B Barnitzke, M Corrales… - … of the Royal …, 2013 - royalsocietypublishing.org
Cloud computing technologies have reached a high level of development, yet a number of
obstacles still exist that must be overcome before widespread commercial adoption can …

Umltrust: towards develo** trust-aware software

MG Uddin, M Zulkernine - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
As users in software systems depend on each other for achieving goals, performing tasks,
and utilizing resources, the trust relationships in the systems need to be considered to …

The CORAS tool for security risk analysis

F Vraalsen, F den Braber, MS Lund… - Trust Management: Third …, 2005 - Springer
The CORAS Tool for model-based security risk analysis supports documentation and reuse
of risk analysis results through integration of different risk analysis and software …

Holistic trust design of e-services

SL Presti, M Butler, M Leuschel… - Trust in e-services …, 2007 - igi-global.com
As a central issue of modern e-services, trust has to be tackled early during the development
phases. We present and compare, in this chapter, various works and methodologies that …

How to trust: A model for trust decision making

M Felici - International Journal of Adaptive, Resilient and …, 2012 - igi-global.com
This paper concerns decision-making processes that rely on trust. In particular, it analyzes
how different aspects of trust (eg, trust, trustworthiness, trustworthy evidence) influence trust …

Formal procedural security modeling and analysis

K Weldemariam, A Villafiorita - … on Risks and Security of Internet …, 2008 - ieeexplore.ieee.org
We are involved in a project related to the evaluation and possible introduction of e-voting
for elections held in the Autonomous Province of Trento. One of the goals of the project is …

Structuring compliance risk identification using the CORAS approach: compliance as an asset

SY Esayas - 2014 IEEE International Symposium on Software …, 2014 - ieeexplore.ieee.org
The global scale of modern business and information technology enables companies to
trade across borders but at the risk of being subject to laws in diverse jurisdictions. The …