Security and privacy in the internet of things security


You must choose a topic from one of these areas and conduct research using Google Scholar ONLY.

Application-layer security policies

Access control for applications Access control for databases Data-dissemination controls Data forensics

Enforcement-layer security policies Privacy-preserving techniques Private information retrieval

Search on protected/encrypted data Secure auditing

Secure collaboration Secure data provenance

Secure electronic commerce Secure information sharing Secure knowledge management Secure multiparty computation Secure software development

Securing data/apps on untrusted platforms Securing the semantic web

Security and privacy in GIS/spatial data Security and privacy in healthcare

Security and privacy in the Internet of Things Security policies for databases

Social computing security and privacy Social networking security and privacy

Trust metrics for applications, data, and users Usable security and privacy

Web application security

It will be your job to:

1. Choose a topic that interests you. You don't need to get it approved, b/c here is what it has to be:
a. Scholarly work published in a peer-reviewed journal (IEEE, ACM, etc.)
b. At least 3 pages in length
c. Accessible by Google Scholar and or GMU library resources

2. Once you have found a paper, You have to read it and understand it.

a. You will summarize the paper in one page.

3. Next, go to the last section of the paper and find "areas for further research", typically in the conclusion section and pick a topic from the "areas for further research" and do the same thing you did in #1 - find another paper. Hint: the list of references at the end of the paper you FIRST choose can provide an excellent resource for other papers that cover the topic mentioned in #3.

4. Now summarize this paper, and explain whether or not the new paper's conclusions advanced the topic, re-explained it in a different way, or created yet another area of inquiry for research.

5. As you summarize each paper, you MUST place all references you use or refer to in APA format (hint: most IEEE papers have references in APA format at the end).

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Security and privacy in the internet of things security
Reference No:- TGS02537218

Now Priced at $30 (50% Discount)

Recommended (96%)

Rated (4.8/5)