The Community for Technology Leaders
2008 Second International Conference on Emerging Security Information, Systems and Technologies (2008)
Aug. 25, 2008 to Aug. 31, 2008
ISBN: 978-0-7695-3329-2
pp: 62-67
ABSTRACT
A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper describes a generic solution that ensures end-to-end access control for data generated by wireless sensors and consumed by business applications, based on a new approach for encryption-based access control. The existing security mechanism is captured as Serenity ("System Engineering for Security and Dependability") security patterns that describe a security problem and its solution in an abstract way. The structured description makes the security solution better understandable for non-security experts and helps to disseminate the security knowledge among application developers.
INDEX TERMS
null
CITATION

P. E. Khoury, L. Gomez, A. Laube and A. Cuevas, "Security Patterns for Capturing Encryption-Based Access Control to Sensor Data," 2008 Second International Conference on Emerging Security Information, Systems and Technologies(SECURWARE), vol. 00, no. , pp. 62-67, 2008.
doi:10.1109/SECURWARE.2008.17
81 ms
(Ver 3.3 (11022016))