CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Using Blockchain Technology to Secure the Internet of Things In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro... Request to download |
![]() | Security Guidance for Early Adopters of the Internet of Things - Chinese Translation This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to ... Request to download |
![]() | Observations and Recommendations on Connected Vehicle Security The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real... Request to download |
![]() | Establishing a Safe and Secure Municipal Drone Program This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol... Request to download |
![]() | Future Proofing the Connected World An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download |
![]() | Identity and Access Management for the Internet of Things - Japanese Translation This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged... Request to download |
![]() | Guidelines for Safe Smart Cities Interest in the smart city concept has grown continuously over the past few years, with the top research being done in the Internet of Things (IoT) and urban... Request to download |
![]() | Identity and Access Management for the Internet of Things This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w... Request to download |
![]() | New Security Guidance for Early Adopters of the IoT This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to ai... Request to download |