Research Article
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method
Table 2
List of selected attribute.
| Requirements | [7] | [8] | [9] | [10] | [11] | [12] | [31] | [32] | [33] | [34] | [35] | [36] | [37] | [38] | [39] | [40] | [41] | [42] |
| Confidentiality | | | | | | | | | | | | | | | | | | | Authentication | | | | | | | | | | | | | | | | | | | Integrity | | | | | | | | | | | | | | | | | | | Availability | | | | | | | | | | | | | | | | | | | Authorization | | | | | | | | | | | | | | | | | | | Physical security | | | | | | | | | | | | | | | | | | | Continuity | | | | | | | | | | | | | | | | | | | Trustworthiness | | | | | | | | | | | | | | | | | | | Auditing | | | | | | | | | | | | | | | | | | | Network monitoring | | | | | | | | | | | | | | | | | | | Secure key management | | | | | | | | | | | | | | | | | | | Access control | | | | | | | | | | | | | | | | | | | Nonrepudiation | | | | | | | | | | | | | | | | | | |
|
|