scispace - formally typeset
Search or ask a question
Topic

Threat model

About: Threat model is a research topic. Over the lifetime, 2077 publications have been published within this topic receiving 39528 citations. The topic is also known as: threat modeling & threat modelling.


Papers
More filters
Journal ArticleDOI
TL;DR: This chapter addresses the psychological effects of social stigma by reviewing and organizing recent theory and empirical research within an identity threat model of stigma, which posits that situational cues, collective representations of one's stigma status, and personal beliefs and motives shape appraisals of the significance of stigma-relevant situations for well-being.
Abstract: This chapter addresses the psychological effects of social stigma. Stigma directly affects the stigmatized via mechanisms of discrimination, expectancy confirmation, and automatic stereotype activation, and indirectly via threats to personal and social identity. We review and organize recent theory and empirical research within an identity threat model of stigma. This model posits that situational cues, collective representations of one's stigma status, and personal beliefs and motives shape appraisals of the significance of stigma-relevant situations for well-being. Identity threat results when stigma-relevant stressors are appraised as potentially harmful to one's social identity and as exceeding one's coping resources. Identity threat creates involuntary stress responses and motivates attempts at threat reduction through coping strategies. Stress responses and coping efforts affect important outcomes such as self-esteem, academic achievement, and health. Identity threat perspectives help to explain the...

2,680 citations

Journal ArticleDOI
TL;DR: An intelligent collaborative security model to minimize security risk is proposed; how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context is discussed; and various IoT and eHealth policies and regulations are addressed to determine how they can facilitate economies and societies in terms of sustainable development.
Abstract: The Internet of Things (IoT) makes smart objects the ultimate building blocks in the development of cyber-physical smart pervasive frameworks. The IoT has a variety of application domains, including health care. The IoT revolution is redesigning modern health care with promising technological, economic, and social prospects. This paper surveys advances in IoT-based health care technologies and reviews the state-of-the-art network architectures/platforms, applications, and industrial trends in IoT-based health care solutions. In addition, this paper analyzes distinct IoT security and privacy features, including security requirements, threat models, and attack taxonomies from the health care perspective. Further, this paper proposes an intelligent collaborative security model to minimize security risk; discusses how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context; addresses various IoT and eHealth policies and regulations across the world to determine how they can facilitate economies and societies in terms of sustainable development; and provides some avenues for future research on IoT-based health care based on a set of open issues and challenges.

2,190 citations

Book ChapterDOI
17 Aug 2003
TL;DR: This paper proposes several efficient techniques for building private circuits resisting side channel attacks, and provides a formal threat model and proofs of security for their constructions.
Abstract: Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access a bounded number of wires in the circuit This question is motivated by side channel attacks, which allow an adversary to gain partial access to the inner workings of hardware Recent work has shown that side channel attacks pose a serious threat to cryptosystems implemented in embedded devices In this paper, we develop theoretical foundations for security against side channels In particular, we propose several efficient techniques for building private circuits resisting this type of attacks We initiate a systematic study of the complexity of such private circuits, and in contrast to most prior work in this area provide a formal threat model and give proofs of security for our constructions

968 citations

Proceedings ArticleDOI
18 Apr 2017
TL;DR: A lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy benefits, is proposed.
Abstract: There has been increasing interest in adopting BlockChain (BC), that underpins the crypto-currency Bitcoin, in Internet of Things (IoT) for security and privacy. However, BCs are computationally expensive and involve high bandwidth overhead and delays, which are not suitable for most IoT devices. This paper proposes a lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy benefits. IoT devices benefit from a private immutable ledger, that acts similar to BC but is managed centrally, to optimize energy consumption. High resource devices create an overlay network to implement a publicly accessible distributed BC that ensures end-to-end security and privacy. The proposed architecture uses distributed trust to reduce the block validation processing time. We explore our approach in a smart home setting as a representative case study for broader IoT applications. Qualitative evaluation of the architecture under common threat models highlights its effectiveness in providing security and privacy for IoT applications. Simulations demonstrate that our method decreases packet and processing overhead significantly compared to the BC implementation used in Bitcoin.

554 citations

Journal ArticleDOI
TL;DR: In this article, three studies were conducted to assess the uncertainty-threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation.
Abstract: Three studies are conducted to assess the uncertainty- threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation. Results from structural equation models provide consistent support for the hypothesis that uncertainty avoidance (e.g., need for order, intolerance of ambiguity, and lack of openness to experience) and threat management (e.g., death anxiety, system threat, and perceptions of a dangerous world) each contributes independently to conservatism (vs. liberalism). No support is obtained for alternative models, which predict that uncertainty and threat management are associated with ideological extremism or extreme forms of conservatism only. Study 3 also reveals that resistance to change fully mediates the association between uncertainty avoidance and conservatism, whereas opposition to equality partially mediates the association between threat and conservatism. Implications for understanding the epistemic and existential bases of political orientation are discussed.

542 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
87% related
Server
79.5K papers, 1.4M citations
86% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
83% related
Network packet
159.7K papers, 2.2M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202331
202263
2021236
2020260
2019236
2018208