Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021 - dl.acm.org
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

Design notations for secure software: a systematic literature review

A Van den Berghe, R Scandariato, K Yskout… - Software & Systems …, 2017 - Springer
In the past 10 years, the research community has produced a significant number of design
notations to represent security properties and concepts in a design artifact. These notations …

Component-based refinement and verification of information-flow security policies for cyber-physical microservice architectures

C Gerking, D Schubert - 2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
Since cyber-physical systems are inherently vulnerable to information leaks, software
architects need to reason about security policies to define desired and undesired …

Test-suite-guided discovery of least privilege for cloud infrastructure as code

R Shimizu, Y Nunomura, H Kanuka - Automated Software Engineering, 2024 - Springer
Infrastructure as code (IaC) for the cloud, which automatically configures a system's cloud
environment from source code, is an important practice thanks to its efficient, reproducible …

A security modeling and verification method of embedded software based on Z and MARTE

X Hu, Y Zhuang, F Zhang - Computers & Security, 2020 - Elsevier
The existing modeling and verification methods for embedded software are insufficient
towards the increasingly prominent security requirements. In this paper, aiming at high …

Test-based least privilege discovery on cloud infrastructure as code

R Shimizu, H Kanuka - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
Infrastructure as Code (IaC) for cloud is an important practice due to its efficient and
reproducible provisioning of cloud environments. On a cloud IaC definition (template) …

Designing security and privacy requirements in Internet of Things: A survey

N Alhirabi, O Rana, C Perera - arxiv preprint arxiv:1910.09911, 2019 - arxiv.org
The design and development process for the Internet of Things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

Extended RBAC model with task-constraint rules

L Ma, Y Zhou, W Duan - Future Information Technology: FutureTech 2013, 2014 - Springer
RBAC model supports the principle of least privilege by the appropriate combination of roles
assigned to users. However, the minimum role set is hard to find. Role hierarchy and …

An overview of CARAT: a computer assisted research and analysis tool

JM Snyder, KJ Lynch - … of the Twenty-Fourth Annual Hawaii …, 1991 - ieeexplore.ieee.org
The Mosaic Group at the University of Arizona studies the design, implementation, testing,
and validation of integrated collaborative research systems (ICRS). The authors describe …

Task-constrained rbac model and its privilege redundancy analysis

Y Zhou, L Ma, M Wen - 2015 2nd International Conference on …, 2015 - ieeexplore.ieee.org
RBAC supports the principle of least privilege by the appropriate combination of roles
assigned to users. However, the minimum role set is hard to find. Role hierarchy and …