Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Eliot Lear"'
Publikováno v:
The Fifth International Conference on Safety and Security with IoT ISBN: 9783030942847
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5dac12691477e67d5ff0f2f1e794d15c
https://doi.org/10.1007/978-3-030-94285-4_9
https://doi.org/10.1007/978-3-030-94285-4_9
Autor:
Eliot Lear, Clint Wilson, Ashwini Kadam, Douglas C. Montgomery, Drew Cohen, Darshak Thakore, Susan Symington, Avesta Hojjati, Joshua Harrington, Mark Walker, Craig Pratt, Joshua Klosterman, Dean Coclin, Jaideep Singh, Parisa Grayeli, Donna Dodson, Brian Weis, Blaine Mulugeta, Murugiah Souppaya, Mudumbai Ranganathan, W. Polk, Steve Johnson, Timothy W. Jones, Yemi Fashina, Adnan Baykal, William Barker, Kevin Yeich
The goal of the Internet Engineering Task Force's Manufacturer Usage Description (MUD) specification is for Internet of Things (IoT) devices to behave as intended by the manufacturers of the devices. MUD provides a standard way for manufacturers to i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::716164442d27028c43a831b0f67d00ba
https://doi.org/10.6028/nist.sp.1800-15
https://doi.org/10.6028/nist.sp.1800-15
Publikováno v:
Human Aspects of Information Security and Assurance ISBN: 9783030811105
HAISA
HAISA
Secure installation of Internet of Things (IoT) devices requires configuring access control correctly for each device. In order to enable correct configuration Manufacturer Usage Description (MUD) has been developed by Internet Engineering Task Force
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6b9338494de520e744bad2ebd5ee8baf
https://doi.org/10.1007/978-3-030-81111-2_11
https://doi.org/10.1007/978-3-030-81111-2_11
This memo specifies a component-based architecture for manufacturer usage descriptions (MUD). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly functi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a1da39bc47c1140bc2682e4a69150c06
https://doi.org/10.17487/rfc8520
https://doi.org/10.17487/rfc8520
Autor:
Eliot Lear
Publikováno v:
IEEE Internet Computing. 18:62-65
The US government is seeking to relinquish oversight of Internet resources that include domain names, IP addresses, and protocol parameters. Proper stewardship of these resources is necessary for the Internet to properly grow beyond the more than 2.5
Autor:
Brian Weis, Eliot Lear
Publikováno v:
MoWNet
Through the simplifying assumption that a Thing has a single use or a small number of intended uses, it is possible to reduce the threat surface of the device by constraining the communication paths needed for those uses. This is accomplished using a
Publikováno v:
SSRN Electronic Journal.
Over a quarter century has passed since IP addresses from the Internet’s now globally ubiquitous (IPv4) address pool first began to be distributed to and used by operators of the 28,000 and counting independent routing domains that constitute today