A model-driven approach to ensure trust in the IoT
Abstract The Internet of Things (IoT) is a paradigm that permits smart entities to be
interconnected anywhere and anyhow. IoT opens new opportunities but also rises new …
interconnected anywhere and anyhow. IoT opens new opportunities but also rises new …
Modelling compliance risk: a structured approach
This article presents a structured and systematic approach for identifying and modelling
compliance risks. The sophistication with which modern business is carried out and the …
compliance risks. The sophistication with which modern business is carried out and the …
Legal issues in clouds: towards a risk inventory
Cloud computing technologies have reached a high level of development, yet a number of
obstacles still exist that must be overcome before widespread commercial adoption can …
obstacles still exist that must be overcome before widespread commercial adoption can …
Umltrust: towards develo** trust-aware software
As users in software systems depend on each other for achieving goals, performing tasks,
and utilizing resources, the trust relationships in the systems need to be considered to …
and utilizing resources, the trust relationships in the systems need to be considered to …
The CORAS tool for security risk analysis
F Vraalsen, F den Braber, MS Lund… - Trust Management: Third …, 2005 - Springer
The CORAS Tool for model-based security risk analysis supports documentation and reuse
of risk analysis results through integration of different risk analysis and software …
of risk analysis results through integration of different risk analysis and software …
Holistic trust design of e-services
As a central issue of modern e-services, trust has to be tackled early during the development
phases. We present and compare, in this chapter, various works and methodologies that …
phases. We present and compare, in this chapter, various works and methodologies that …
How to trust: A model for trust decision making
M Felici - International Journal of Adaptive, Resilient and …, 2012 - igi-global.com
This paper concerns decision-making processes that rely on trust. In particular, it analyzes
how different aspects of trust (eg, trust, trustworthiness, trustworthy evidence) influence trust …
how different aspects of trust (eg, trust, trustworthiness, trustworthy evidence) influence trust …
Formal procedural security modeling and analysis
K Weldemariam, A Villafiorita - … on Risks and Security of Internet …, 2008 - ieeexplore.ieee.org
We are involved in a project related to the evaluation and possible introduction of e-voting
for elections held in the Autonomous Province of Trento. One of the goals of the project is …
for elections held in the Autonomous Province of Trento. One of the goals of the project is …
Structuring compliance risk identification using the CORAS approach: compliance as an asset
SY Esayas - 2014 IEEE International Symposium on Software …, 2014 - ieeexplore.ieee.org
The global scale of modern business and information technology enables companies to
trade across borders but at the risk of being subject to laws in diverse jurisdictions. The …
trade across borders but at the risk of being subject to laws in diverse jurisdictions. The …