TY - GEN
T1 - Cyber-assurance for internet of things and fog computing architectures
AU - Brooks, Tyson
AU - Chin, Shiu Kai
AU - Devendorf, Erich
AU - Dollar, Col William
N1 - Publisher Copyright:
© 2018 IEEE Computer Society. All rights reserved.
PY - 2018
Y1 - 2018
N2 - Cyber-Assurance theory, application and embedded security for the Internet of Things (IoT)/Fog Computing architectures is based on theoretical aspects and studies of practical applications. The objective of this minitrack is to increase the visibility of current research and emergent trends in the area of Cyber-Assurance for IoT and Fog computing architectures. Cyber-Assurance is the justified confidence that networked systems are adequately secure to meet operational needs, even in the presence of attacks, failures, accidents and unexpected events. The Internet of Things (IoT) is the network of physical devices, vehicles, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data. Fog computing refers to extending cloud computing to the edge of an enterprise's network. Cyber-assurance means that IoT/Fog Computing smart internet connected devices (ICD) and networks provide the opportunity of automatically securing themselves against cyber-attacks while addressing cybersecurity concerns.
AB - Cyber-Assurance theory, application and embedded security for the Internet of Things (IoT)/Fog Computing architectures is based on theoretical aspects and studies of practical applications. The objective of this minitrack is to increase the visibility of current research and emergent trends in the area of Cyber-Assurance for IoT and Fog computing architectures. Cyber-Assurance is the justified confidence that networked systems are adequately secure to meet operational needs, even in the presence of attacks, failures, accidents and unexpected events. The Internet of Things (IoT) is the network of physical devices, vehicles, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data. Fog computing refers to extending cloud computing to the edge of an enterprise's network. Cyber-assurance means that IoT/Fog Computing smart internet connected devices (ICD) and networks provide the opportunity of automatically securing themselves against cyber-attacks while addressing cybersecurity concerns.
UR - http://www.scopus.com/inward/record.url?scp=85108255041&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85108255041&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85108255041
T3 - Proceedings of the Annual Hawaii International Conference on System Sciences
SP - 5552
EP - 5553
BT - Proceedings of the 51st Annual Hawaii International Conference on System Sciences, HICSS 2018
A2 - Bui, Tung X.
PB - IEEE Computer Society
T2 - 51st Annual Hawaii International Conference on System Sciences, HICSS 2018
Y2 - 2 January 2018 through 6 January 2018
ER -