Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems

Bibliographic Information

Other Title
  • Embedding Security by Design

Description

<jats:p>Over the years, pervasive computing and communication technologies have enabled the emergence of new computing paradigms that have gained importance across a wide spectrum of domains. The three most notable that have witnessed significant advancements and have a solid track record of exponential growth in diverse applications are the Internet of Things (IoT), Cloud, and Mobile Computing. The ubiquity of these paradigms, their expandability, and applicability in different problem spaces have made them invaluable in modern computing solutions. Security becomes a real concern, especially when it comes to the development of applications in these environments, as numerous security issues may arise from potential design flaws. Secure application development across these three technologies can only be achieved when applications and systems are designed and developed with security in mind. This will improve the quality of the solutions and ensure that vulnerabilities are identified. It will also help in defining countermeasures against cyberattacks or mitigate the effects of potential threats to the systems. This article surveys existing approaches, tools, and techniques for attack and system modeling applicable to IoT, Cloud computing, and Mobile Computing. It also evaluates the strengths and limitations of the reviewed approaches and tools, from which it highlights the main existing challenges and open issues in the area.</jats:p>

Journal

  • ACM Computing Surveys

    ACM Computing Surveys 53 (2), 1-32, 2020-03-20

    Association for Computing Machinery (ACM)

Citations (1)*help

See more

Details 詳細情報について

Report a problem

Back to top