scispace - formally typeset
Search or ask a question
Topic

Internet appliance

About: Internet appliance is a research topic. Over the lifetime, 1974 publications have been published within this topic receiving 43571 citations.


Papers
More filters
BookDOI
07 Nov 2016
TL;DR: This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications.
Abstract: This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and nonrepudiation.

16 citations

Proceedings ArticleDOI
20 Aug 2011
TL;DR: This paper analyzes security issues of the Internet of Things, and comes up with the security mechanism about it.
Abstract: product of the development in information technology, the concepts of things have followed Internet of Things into the people's attention. Internet of Things help things be connected to the Internet through rfid sensing equipment, intelligent identification and management, is the second wave of the information industry after computer, Internet and mobile communication network. This paper analyzes security issues of the Internet of Things, and comes up with the security mechanism about it.

16 citations

Patent
23 Feb 1999
TL;DR: In this paper, the authors proposed a simple mechanism to steer users to given Internet services, such as the Web pages of sponsors, by allowing a sponsor to grant a dial-in user unlimited access to the Internet after the user has accessed its Internet services.
Abstract: This invention provides an Internet Access Provider (IAP) a simple mechanism to steer users to given Internet services, such as the Web pages, of sponsors. The mechanism allows a sponsor to grant a dial-in user unlimited access to the Internet after the user has first accessed its Internet services. The invention is thus important for any IAP that wants to receive income from sponsors by steering Internet users to their services. In the ultimate case, an IAP could receive all its income from sponsors and thus be able to offer the Internet access for free. The key characteristics of the present invention is that a user is steered to the Internet services of a sponsor based on a sponsor specific called telephone number or a sponsor specific login name.

16 citations

Posted Content
TL;DR: This paper considers different approaches to technological protection of user data privacy in the world of Internet of Things and what level of protection can be provided by applying approaches based on secure multi-party computations.
Abstract: Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

16 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
81% related
Mobile device
58.6K papers, 942.8K citations
77% related
Information system
107.5K papers, 1.8M citations
76% related
Web page
50.3K papers, 975.1K citations
74% related
Mobile computing
51.3K papers, 1M citations
74% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20237
202215
20211
20202
201814
201770