By Topic

Security Patterns for Capturing Encryption-Based Access Control to Sensor Data

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Angel Cuevas ; SAP Res., SAP Labs., Sophia Antipolis ; Paul El Khoury ; Laurent Gomez ; Annett Laube

A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper describes a generic solution that ensures end-to-end access control for data generated by wireless sensors and consumed by business applications, based on a new approach for encryption-based access control. The existing security mechanism is captured as serenity ("system engineering for security and dependability") security patterns that describe a security problem and its solution in an abstract way. The structured description makes the security solution better understandable for non-security experts and helps to disseminate the security knowledge among application developers.

Published in:

2008 Second International Conference on Emerging Security Information, Systems and Technologies

Date of Conference:

25-31 Aug. 2008