On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment (original) (raw)
Related papers
Annual Computer Security Applications Conference
IEEE Access, 2021
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles
IEEE Transactions on Dependable and Secure Computing, 2020
SoK: Beyond IoT MUD Deployments - Challenges and Future Directions
ArXiv, 2020
Extending MUD profiles through an Automated IoT Security Testing Methodology
IEEE Access
Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)
ArXiv, 2018
Combining MUD Policies with SDN for IoT Intrusion Detection
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018
eMUD: Enhanced Manufacturer Usage Description for IoT Botnets Prevention on Home WiFi Routers
IEEE Access
Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network
2019
Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems
Sensors
NFV-based IoT Security for Home Networks using MUD
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020
IoT MUD enforcement in the edge cloud using programmable switch
Proceedings of the ACM SIGCOMM Workshop on Formal Foundations and Security of Programmable Network Infrastructures
ASTo: A Tool for Security Analysis of IoT Systems
Context-aware Automatic Access Policy Specification for IoT Environments
2018
CAPE: Continuous Access Policy Enforcement for IoT Deployments
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019
XACML for Building Access Control Policies in Internet of Things
A standardized approach to deal with firewall and mobility policies in the IoT
2014
Adaptive Access Control Policies for IoT Deployments
2020 International Wireless Communications and Mobile Computing (IWCMC), 2020
A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things
Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements
Ponciano Jorge Escamilla-Ambrosio
2020 IEEE Colombian Conference on Communications and Computing (COLCOM), 2020
Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches
Qubahan academic journal, 2024
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
A Toolkit for Specifying Service Level Agreements for IoT Applications
International Conference on High Performance Computing and Simulation, 2018
IoTCrawler: Browsing the Internet of Things
2018 Global Internet of Things Summit (GIoTS), 2018
2020
An access control management protocol for Internet of Things devices
Network Security
POSTER: Towards Exposing Internet of Things: A Roadmap
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Security Policy Automation-from Specification to Device Configuration
2008