Control-flow integrity principles, implementations, and applications, ACM Transactions on Information and System Security (TISSEC), vol.13, p.1, 2009. ,
Security and privacy in the internet of things: Current status and open issues, 2014 international conference on privacy and security in mobile systems (PRISMS), pp.1-8, 2014. ,
Fog computing for the Internet of Things: Security and privacy issues, IEEE Internet Computing, vol.21, 2017. ,
Internet of Things: A survey on the security of IoT frameworks, Journal of Information Security and Applications, vol.38, pp.8-27, 2018. ,
Defense trees for economic evaluation of security investments, First International Conference on Availability, Reliability and Security (ARES'06, p.8, 2006. ,
The role of trust management in distributed systems security, Secure Internet Programming, pp.185-210, 1999. ,
Connected vehicles, the internet of things, and fog computing, The eighth ACM international workshop on vehicular inter-networking (VANET), pp.13-15, 2011. ,
Fog computing and its role in the internet of things, Proc. MCC workshop on Mobile cloud computing, 2012. ,
Reversing the operating system of a java based smart card, Journal of Computer Virology and Hacking Techniques, vol.10, pp.239-253, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01024393
A new formalism that combines advantages of fault-trees and markov models: Boolean logic driven markov processes, Reliability Engineering & System Safety, vol.82, pp.149-163, 2003. ,
Data security and privacy protection issues in cloud computing, 2012 International Conference on Computer Science and Electronics Engineering, vol.1, pp.647-651, 2012. ,
Towards secure convergence of cloud and IoT, 2018. ,
, The treacherous 12 -top threats to cloud computing + industry insights, 2017.
Losing control: On the effectiveness of control-flow integrity under stack attacks, Proc. ACM SIGSAC Conference on Computer and Communications Security, 2015. ,
, uri=OJ: L:2016:119:FULL&from=EL, vol.269, 2014.
Common criteria for information technology security evaluation, part 1: Introduction and general model (2009) version 3.1, revision, vol.3, 2009. ,
The performance cost of shadow stacks and stack canaries, Proc. ACM Symposium on Information, 2015. ,
Challenges of connecting edge and cloud computing: A security and forensic perspective, IEEE Cloud computing, vol.4, 2017. ,
Blockchain enabled fog structure to provide data security in iot applications, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02003055
RightScale state of the cloud report, 2019. ,
Evaluating critical security issues of the iot world: Present and future challenges, IEEE Internet of Things Journal, vol.5, pp.2483-2495, 2017. ,
IoT technology disruptions: A Gartner trend insight report, 2017. ,
Construction and strategies in iot security system, 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing, pp.1129-1132, 2013. ,
js: A remote software-induced fault attack in javascript, Proc. Intl. Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2016. ,
A classification of SQL-injection attacks and countermeasures, Proc. IEEE International Symposium on Secure Software Engineering, 2006. ,
, IEEE 1934-2018 -IEEE standard for adoption of OpenFog reference architecture for fog computing, IEEE Standards Association, 2018.
Security of the internet of things: perspectives and challenges, Wireless Networks, vol.20, pp.2481-2501, 2014. ,
Iot security: Review, blockchain solutions, and open challenges, Future Generation Computer Systems, vol.82, pp.395-411, 2018. ,
Fog computing security: a review of current applications and security solutions, Journal of Cloud Computing, vol.6, issue.1, 2017. ,
Build security into your network's dna: The zero trust network architecture, 2010. ,
The byzantine generals problem, ACM Transactions on Programming Languages and Systems (TOPLAS), vol.4, pp.382-401, 1982. ,
Trust management in distributed systems, Computer, vol.40, pp.45-53, 2007. ,
External integrity verification for outsourced big data in cloud and iot: A big picture, Future generation computer systems, vol.49, pp.58-67, 2015. ,
Blockchain-enabled security in electric vehicles cloud and edge computing, IEEE Network, vol.32, p.3, 2018. ,
The Internet of Things: Five critical questions ,
Internet of things: Vision, applications and research challenges, Ad hoc networks, vol.10, pp.1497-1516, 2012. ,
Security & distributed systems, 1995. ,
Security and privacy in fog computing: Challenges, IEEE Access, vol.5, 2017. ,
Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations, IEEE Communications Surveys & Tutorials, 2019. ,
OpenFog reference architecture for fog computing, 2017. ,
SmashGuard: A hardware solution to prevent security attacks on the function return address, IEEE Transactions on Computers, vol.55, issue.10, 2006. ,
Authenticating query results in edge computing, Proc. ICDE, 2004. ,
Fog computing security challenges and future directions [energy and security, IEEE Consumer Electronics Magazine, vol.8, pp.92-96, 2019. ,
Threats to networking cloud and edge datacenters in the internet of things, IEEE Cloud Computing, vol.3, pp.64-71, 2016. ,
A survey and analysis of security threats and challenges, Future Generation Computer Systems, vol.78, pp.680-698, 2018. ,
Attack countermeasure trees (act): towards unifying the constructs of attack and defense trees, Security and Communication Networks, vol.5, pp.929-943, 2012. ,
Attack trees, Dr. Dobb's journal, vol.24, pp.21-29, 1999. ,
Security, privacy and trust in internet of things: The road ahead, Computer networks, vol.76, pp.146-164, 2015. ,
An ontology for network security attacks, Asian Applied Computing Conference, pp.317-323, 2004. ,
Kerberos: An authentication service for open network systems, Usenix Winter, pp.191-202, 1988. ,
A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services, IEEE Communications Surveys & Tutorials, vol.20, pp.3453-3495, 2018. ,
An overview of fog computing and its security issues, Concurrency and Computation: Practice and Experience, vol.28, pp.2991-3005, 2016. ,
Distributed systems: principles and paradigms, 2007. ,
Cross site scripting prevention with dynamic data tainting and static analysis, Proc. NDSS, 2007. ,
Authentication in cloud-driven IoT-based big data environment: Survey and outlook, Journal of Systems Architecture, vol.97, pp.185-196, 2019. ,
, IDC directions 2017: IoT forecast, 5G and related sessions, 2017.
Common criteria, 2019. ,
, Wikipedia. Communication channel, 2019.
A blockchain-based computation offloading method for edge computing in 5g networks ,
Security and privacy issues of fog computing: A survey, Proc. International conference on wireless algorithms, systems, and applications, 2015. ,
A man-in-the-middle attack on 3g-wlan interworking, Proc. IEEE Conference on Communications and Mobile Computing, 2010. ,
IoT security: ongoing challenges and research opportunities, 2014 IEEE 7th international conference on service-oriented computing and applications, pp.230-234, 2014. ,
A survey on the Internet of things security, Ninth international conference on computational intelligence and security, pp.663-667, 2013. ,