The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article presents the results of studies of the physical security system in the infrastructure facility of a region. The following results have been obtained: structural and functional decomposition of the physical security system for the regional infrastructure has been performed; engineering solutions for the implementation of the standard functions for the subsystems of the research object have...
In the field of health, networked medical devices are closely intertwined in the structure of the Internet of things. A healthcare IoT infrastructure with a brief description of each component is presented. These components are a device with a reader, Cloud, healthcare provider and communication channel. As the title implies the paper presents simple cases with a few models of healthcare IoT system...
The purpose of this paper is to develop a framework to use Assurance Case methodology for Industrial IoT systems (IIoT). To achieve a general goal we discuss the three following issues. Firstly, a brief analysis of state-of-the-art researches and resources in area of Assurance Case is done. Secondly, we discuss specific components for IIoT Assurance Case with focus on Security Assurance. Thirdly,...
This paper represents possible approaches to cyber security assurance for implementation the configuration process of Field Programmable Gates Array (FPGA) based platform for safety critical applications. It also contains results of conducted analysis for secure configuration process in existing platforms, similar in terms of functionality, but based on different technologies. Protection concepts...
Fundamentals of diversity and multi-version systems (MVS) are overviewed. Main concepts and taxonomy of multi-version computing, methods of diversity assessment and technologies of development are analyzed. Principle D3 (Defense-in-Depth&Diversity) is researched using FTA (failure tree analysis) to understand its influence on safety and security considering physical, design faults and attacks...
Assurance (Security and Safety) Case is a proven-in-use methodology to demonstrate a system compliance with security and safety critical requirements. An advance approach to improve Assurance Case is proposed in a view of Assurance Case Driven Design (AC DD). A practical using of AC DD lays in cost-effectiveness improvement of certification and licensing processes Assurance Case is based on graphical...
One of the key subsystems from point of view of security of the complex IoT system is the smart business center (SB?) system. Some problems the design and operation of the SBC system are analyzed. When analysis of safety of the IoT system must take into account the reliability and security of the system at several levels: the level of sensors, the level of communication (communication lines, router,...
Main elements of critical FPGA-based information and control systems (I&Cs) security assessment are described. It is proposed to use combination of traditional techniques for reliability and safety analysis: GAP-analysis and IMECA-analysis (modification of FMECA which takes into account intrusion to the system) for analysis of requirements and possible safety and security deficits which could...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.