Edge computing for cyber-physical systems: A systematic mapping study emphasizing trustworthiness
JMG Sánchez, N Jörgensen, M Törngren… - … -Physical Systems …, 2022 - dl.acm.org
… trustworthiness aspects including resilient fog system design (considering reliability and
availability and tradeoffs wrt latency, throughput, and security), fog system … infrastructure or used …
availability and tradeoffs wrt latency, throughput, and security), fog system … infrastructure or used …
Security and Trust in the 6G Era
V Ziegler, P Schneider, H Viswanathan, M Montag… - Ieee …, 2021 - ieeexplore.ieee.org
… architecture [2] in conjunction with softwarization and IT-based infrastructure operations as …
the ultimate goal of trustworthy 6G networks. We consider resilience against all kinds of cyber-…
the ultimate goal of trustworthy 6G networks. We consider resilience against all kinds of cyber-…
[PDF][PDF] Developing cyber resilient systems: a systems security engineering approach
R Ross, V Pillitteri, R Graubart, D Bodeau, R McQuaid - 2019 - csrc.nist.gov
… trustworthy, secure systems that are cyber resilient. Cyber resilient systems are systems that
… • An example of how cyber resiliency could be applied in the critical infrastructure based on …
… • An example of how cyber resiliency could be applied in the critical infrastructure based on …
Resilience estimation of critical infrastructure systems: Application of expert judgment
… Generally, when historical data are inadequate or unavailable, most developed resilience
assessments will not provide high reliable analysis. In such cases, the expert can provide …
assessments will not provide high reliable analysis. In such cases, the expert can provide …
Hardware-based solutions for trusted cloud computing
O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
… access to the trusted cloud infrastructure, bypasses the trusted system software protection
mechanisms… They give the requirements of a tamper-resistant TEE for data in all their lifecycle. …
mechanisms… They give the requirements of a tamper-resistant TEE for data in all their lifecycle. …
Cloud based intrusion detection and prevention system for industrial control systems using software defined networking
… With a programmable infrastructure it is easier to adapt to changes in cloud as solutions require
… ” (BYOD) threats where devices in the network are trusted. All traffic is forwarded through …
… ” (BYOD) threats where devices in the network are trusted. All traffic is forwarded through …
Cyber resilience protection for industrial internet of things: A software-defined networking approach
RF Babiceanu, R Seker - Computers in industry, 2019 - Elsevier
… dependable services. This work follows the framework defined in [3] and brings together the
resilience and (cyber) security characteristics of a system … cyber-infrastructure. Towards that …
resilience and (cyber) security characteristics of a system … cyber-infrastructure. Towards that …
[HTML][HTML] Digital Twin conceptual framework for improving critical infrastructure resilience
E Brucherseifer, H Winter, A Mentges… - at …, 2021 - degruyter.com
… Requirement C3 requests the Digital Twin to be a reliable and resilient tool. As the core …
a challenge due to privacy concerns of surveillance systems and the complexity of the matter. …
a challenge due to privacy concerns of surveillance systems and the complexity of the matter. …
A framework to define the relationship between cyber security and cloud performance
A Bhardwaj, S Goundar - Computer Fraud & Security, 2019 - Elsevier
… Performance monitoring systems usually process and … cloud infrastructure but has control
over operating systems, storage … enterprise risk and resilience for various global multinationals. …
over operating systems, storage … enterprise risk and resilience for various global multinationals. …
Isolation in cloud computing infrastructures: new security challenges
… One of the major challenges in cloud infrastructures is trusted execution of software on …
in decentralized cloud infrastructures like Fog systems which aim to extend cloud services by …
in decentralized cloud infrastructures like Fog systems which aim to extend cloud services by …