4.7 Article

Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design

期刊

ACM COMPUTING SURVEYS
卷 53, 期 2, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3376123

关键词

IoT; Cloud computing; Mobile computing; system modeling; attack modeling; security; survey

资金

  1. FCT-Fundacao para a Ciencia e Tecnologia (Portugal) [SFRH/BD/133838/2017, 32/2018-B00582, UID/EEA/50008/2019, POCI-01-0145-FEDER-030657]
  2. European Regional Development Fund (ERDF) through the Programa Operacional Regional do Centro (Centro 2020)

向作者/读者索取更多资源

Over the years, pervasive computing and communication technologies have enabled the emergence of new computing paradigms that have gained importance across a wide spectrum of domains. The three most notable that have witnessed significant advancements and have a solid track record of exponential growth in diverse applications are the Internet of Things (loT), Cloud, and Mobile Computing. The ubiquity of these paradigms, their expandability, and applicability in different problem spaces have made them invaluable in modern computing solutions. Security becomes a real concern, especially when it comes to the development of applications in these environments, as numerous security issues may arise from potential design flaws. Secure application development across these three technologies can only be achieved when applications and systems are designed and developed with security in mind. This will improve the quality of the solutions and ensure that vulnerabilities are identified. It will also help in defining countermeasures against cyberattacks or mitigate the effects of potential threats to the systems. This article surveys existing approaches, tools, and techniques for attack and system modeling applicable to IoT, Cloud computing, and Mobile Computing. It also evaluates the strengths and limitations of the reviewed approaches and tools, from which it highlights the main existing challenges and open issues in the area.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据