With the rapid growth of Internet-of-Things (IoT) devices, especially in the context of smart homes, enduser programming is becoming increasingly common to easily create new functionalities by connecting IoT devices and online services using simple rules, such as event-condition-action (ECA) rules. Unfortunately, IoT devices and platforms are vulnerable under security terms, and the possible countermeasures to security threats are completely hidden to end-users. This position paper presents the idea of involving end-users in the management of security risks. In particular, we describe how existing ECA rules could be expanded to deal with security aspects, and possible strategies to support end-users in the definition and customization of security rules.
Empowering end-users in the specification of security rules / Breve, B.; Deufemia, V.. - 2702:(2020), pp. 53-56. (Intervento presentato al convegno 1st International Workshop on Empowering People in Dealing with Internet of Things Ecosystems, EMPATHY 2020 tenutosi a Ischia nel 29 Settembre 2020).
Empowering end-users in the specification of security rules
Breve B.;
2020
Abstract
With the rapid growth of Internet-of-Things (IoT) devices, especially in the context of smart homes, enduser programming is becoming increasingly common to easily create new functionalities by connecting IoT devices and online services using simple rules, such as event-condition-action (ECA) rules. Unfortunately, IoT devices and platforms are vulnerable under security terms, and the possible countermeasures to security threats are completely hidden to end-users. This position paper presents the idea of involving end-users in the management of security risks. In particular, we describe how existing ECA rules could be expanded to deal with security aspects, and possible strategies to support end-users in the definition and customization of security rules.File | Dimensione | Formato | |
---|---|---|---|
EMPATHY_2020_paper_11-2.pdf
non disponibili
Licenza:
Non specificato
Dimensione
258.76 kB
Formato
Adobe PDF
|
258.76 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.