𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD Methodology

✍ Scribed by Andrea Fiaschetti (editor), Josef Noll (editor), Paolo Azzoni (editor), Roberto Uribeetxeberria (editor)


Publisher
CRC Press
Year
2018
Tongue
English
Leaves
479
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a new approach to embedded systems SPD, the SHIELD philosophy, that relies on an overlay approach to SPD, on a methodology for composable SPD, on the use of semantics, and on the design of embedded systems with built-in SPD. The book explores new ground and illustrates the development of approximately forty prototypes capable of managing and enhancing SPD, including secure boot, trusted execution environments, adaptable radio interfaces, and different implementations of the middleware for measuring and composing SPD.

✦ Table of Contents


Cover
Half Title
Title
Copyright Page
Content
Foreword
Preface
Editors
Contributors
1: Introduction
Andrea Fiaschetti, Josef Noll, Paolo Azzoni, and Roberto Uribeetxeberria
Section I: SHIELD Technologies and Methodology for Security, Privacy, and Dependability
2: Security, Privacy, and Dependability Concepts
Andrea Fiaschetti, Paolo Azzoni, Josef Noll, Roberto Uribeetxeberria, John Gialelis, Kyriakos Stefanidis, Dimitrios Serpanos, and Andreas Papalambrou
3: Security, Privacy, and Dependability Technologies
Paolo Azzoni, Luca Geretti, Antonio Abramo, Kyriakos Stefanidis, John Gialelis, Andreas Papalambrou, Dimitrios Serpanos, Konstantinos Rantos, Andrea Toma, Nawaz Tassadaq, Kresimir Dabcevic, Carlo Regazzoni, Lucio Marcenaro, Massimo Traversone, Mar
4: The SHIELD Approach
Andrea Fiaschetti, Paolo Azzoni, Josef Noll, Roberto Uribeetxeberria, Antonio Pietrabissa, Francesco Delli Priscoli, Vincenzo Suraci, Silvano Mignanti, Francesco Liberati, Martina Panfili, Alessandro Di Giorgio, and Andrea Morgagni
5: Security, Privacy, and Dependability Metrics
Andrea Morgagni, Andrea Fiaschetti, Josef Noll, Ignacio Arenaza-NuΓ±o, and Javier Del Ser
Section II: SHIELD Application Scenarios, New Domains, and Perspectives
6: Airborne Domain
Cecilia Coveri, Massimo Traversone, Marina Silvia Guzzetti, and Paolo Azzoni
7: Railway Domain
Paolo Azzoni, Francesco Rogo, and Andrea Fiaschetti
8: Biometric Security Domain
Paolo Azzoni, Konstantinos Rantos, Luca Geretti, Antonio Abramo, and Stefano Gosetti
9: Perspectives in Secure SMART Environments
Josef Noll, IΓ±aki Garitano, Christian Johansen, Javier Del Ser, and Ignacio Arenaza-NuΓ±o
10: SHIELD Technology Demonstrators
Marco Cesena, Carlo Regazzoni, Lucio Marcenaro, Andrea Toma, NawazΒ Tassadaq, Kresimir Dabcevic, George Hatzivasilis, Konstantinos Fysarakis, Charalampos Manifavas, Ioannis Papaefstathiou, Paolo Azzoni, and Kyriakos Stefanidis,
11: Applying SHIELD in New Domains
Paolo Azzoni, Francesco Rogo, Cecilia Coveri, Marco Steger, Werner Rom, Andrea Fiaschetti, Francesco Liberati, and Josef Noll
Index


πŸ“œ SIMILAR VOLUMES


Measurable and Composable Security, Priv
✍ Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria πŸ“‚ Library πŸ“… 2017 πŸ› CRC Press 🌐 English

<P>With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a new approach to embedded systems SPD, the SHIE

Circuits and Systems for Security and Pr
✍ Farhana Sheikh, Leonel Sousa πŸ“‚ Library πŸ“… 2016 πŸ› CRC Press 🌐 English

This book begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only opt

Security of Biochip Cyberphysical System
✍ Shayan Mohammed; Sukanta Bhattacharjee; Yong-Ak Song; Krishnendu Chakrabarty; Ra πŸ“‚ Library πŸ› Springer International Publishing 🌐 English

Security of Biochip Cyberphysical Systems (2022) [Mohammed et al] [9783030932732]