Topic
Internet appliance
About: Internet appliance is a research topic. Over the lifetime, 1974 publications have been published within this topic receiving 43571 citations.
Papers published on a yearly basis
Papers
More filters
••
07 Nov 2016
TL;DR: This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications.
Abstract: This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and nonrepudiation.
16 citations
••
20 Aug 2011TL;DR: This paper analyzes security issues of the Internet of Things, and comes up with the security mechanism about it.
Abstract: product of the development in information technology, the concepts of things have followed Internet of Things into the people's attention. Internet of Things help things be connected to the Internet through rfid sensing equipment, intelligent identification and management, is the second wave of the information industry after computer, Internet and mobile communication network. This paper analyzes security issues of the Internet of Things, and comes up with the security mechanism about it.
16 citations
•
23 Feb 1999TL;DR: In this paper, the authors proposed a simple mechanism to steer users to given Internet services, such as the Web pages of sponsors, by allowing a sponsor to grant a dial-in user unlimited access to the Internet after the user has accessed its Internet services.
Abstract: This invention provides an Internet Access Provider (IAP) a simple mechanism to steer users to given Internet services, such as the Web pages, of sponsors. The mechanism allows a sponsor to grant a dial-in user unlimited access to the Internet after the user has first accessed its Internet services. The invention is thus important for any IAP that wants to receive income from sponsors by steering Internet users to their services. In the ultimate case, an IAP could receive all its income from sponsors and thus be able to offer the Internet access for free. The key characteristics of the present invention is that a user is steered to the Internet services of a sponsor based on a sponsor specific called telephone number or a sponsor specific login name.
16 citations
••
16 citations
•
TL;DR: This paper considers different approaches to technological protection of user data privacy in the world of Internet of Things and what level of protection can be provided by applying approaches based on secure multi-party computations.
Abstract: Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.
16 citations