Change search
ReferencesLink to record
Permanent link

Direct link
Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario
Number of Authors: 2
2011 (English)Conference paper (Refereed)
Abstract [en]

This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the considered scenario. Using the requirements, a list of major security challenges for future research regarding trust establishment in dynamic networks have been collected and elaboration on some different approaches for future research has been done.This work was supported by the Knowledge foundation and RISE within the ARIES project.

Place, publisher, year, edition, pages
2011, 10. 25-30 p.
National Category
Computer and Information Science
URN: urn:nbn:se:ri:diva-16271OAI: diva2:1038295
First International Workshop on Dependable and Secure Industrial and Embedded Systems (WORDS 2011)
Available from: 2016-10-18 Created: 2016-10-18

Open Access in DiVA

fulltext(539 kB)4 downloads
File information
File name FULLTEXT01.pdfFile size 539 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Other links


Search in DiVA

By author/editor
Löfvenberg, Jacob
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 4 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

ReferencesLink to record
Permanent link

Direct link