Fog Computing, Applications, Security and Challenges, Review
暂无分享,去创建一个
[1] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[2] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[3] Eui-nam Huh,et al. Fog Computing and Smart Gateway Based Communication for Cloud of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[4] Rajkumar Buyya,et al. Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.
[5] Athanasios V. Vasilakos,et al. Fog Computing for Sustainable Smart Cities , 2017, ArXiv.
[6] Suat Özdemir,et al. A fog computing based smart grid model , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[7] Arwa Alrawais,et al. An Attribute-Based Encryption Scheme to Secure Fog Communications , 2017, IEEE Access.
[8] T. Venkat Narayana Rao,et al. A Paradigm Shift from Cloud to Fog Computing , 2015 .
[9] Mugen Peng,et al. Edge computing technologies for Internet of Things: a primer , 2017, Digit. Commun. Networks.
[10] Hannu Tenhunen,et al. An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .
[11] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[12] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[13] Jordan Shropshire,et al. Extending the Cloud with Fog: Security Challenges & Opportunities , 2014, AMCIS.
[14] Hokeun Kim,et al. Authentication and Authorization for the Internet of Things , 2017, IT Professional.
[15] Zenon Chaczko,et al. A review on Fog Computing technology , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[16] Robert Brzoza-Woch,et al. Holistic Approach to Urgent Computing for Flood Decision Support , 2015, ICCS.
[17] Pranali More. REVIEW OF IMPLEMENTING FOG COMPUTING , 2015 .
[18] Hui Wang,et al. The fog computing service for healthcare , 2015, 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech).
[19] Eui-Nam Huh,et al. Fog Computing: The Cloud-IoT\/IoE Middleware Paradigm , 2016, IEEE Potentials.
[20] Marcus Bengtsson,et al. Enhancing smart maintenance management using fog computing technology , 2017, 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).
[21] Soumya Kanti Datta,et al. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing , 2017, 2017 Global Internet of Things Summit (GIoTS).
[22] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[23] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[24] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[25] Xianwei Zhou,et al. Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy Technology , 2016 .
[26] Tushar J. Raval,et al. Fog computing: A review and conceptual architecture, issues, applications and its challenges , 2017 .
[27] Rajkumar Buyya,et al. Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.
[28] Alan Davy,et al. Resource Aware Placement of Data Analytics Platform in Fog Computing , 2016, Cloud Forward.
[29] Tao Zhang,et al. Fog Computing , 2017, IEEE Internet Comput..
[30] Laurent Lemarchand,et al. iFogStor: An IoT Data Placement Strategy for Fog Infrastructure , 2017, 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC).
[31] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[32] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[33] Tie Qiu,et al. Survey on fog computing: architecture, key technologies, applications and open issues , 2017, J. Netw. Comput. Appl..
[34] A Khalid. Privacy and Security Problems in Fog Computing , 2016 .
[35] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[36] Songqing Chen,et al. FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation , 2015, 2015 IEEE International Conference on Networking, Architecture and Storage (NAS).
[37] Grigore Albeanu,et al. Software reliability in the fog computing , 2017, 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT).
[38] Munam Ali Shah,et al. Fog computing: Security issues, solutions and robust practices , 2017, 2017 23rd International Conference on Automation and Computing (ICAC).
[39] Ahmed Shawish,et al. Cloud Computing: Paradigms and Technologies , 2014 .
[40] Fernando Boavida,et al. Opportunistic fog computing: Feasibility assessment and architectural proposal , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[41] Anfeng Liu,et al. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[42] Ming Chen,et al. Analysis of Augmented Reality application based on cloud computing , 2011, 2011 4th International Congress on Image and Signal Processing.
[43] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[44] Tuva Selstad Dybedokken. Trust Management in Fog Computing , 2017 .
[45] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[46] Xavier Masip-Bruin,et al. Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems , 2016, IEEE Wireless Communications.
[47] Malek Ben Salem,et al. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[48] Roger Zimmermann,et al. Dynamic Urban Surveillance Video Stream Processing Using Fog Computing , 2016, 2016 IEEE Second International Conference on Multimedia Big Data (BigMM).
[49] Maged Hamada Ibrahim,et al. Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..
[50] Ruben Mayer,et al. Fog Computing for Improving User Application Interaction and Context Awareness: Demo Abstract , 2017, IoTDI.
[51] Tom H. Luan,et al. Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.
[52] Arslan Munir,et al. IFCIoT: Integrated Fog Cloud IoT: A novel architectural paradigm for the future Internet of Things. , 2017, IEEE Consumer Electronics Magazine.
[53] Anuj Kumar,et al. Fog in Comparison to Cloud: A Survey , 2015 .
[54] Donghyun Kim,et al. On security and privacy issues of fog computing supported Internet of Things environment , 2015, 2015 6th International Conference on the Network of the Future (NOF).
[55] Nitinder Mohan,et al. Edge-Fog cloud: A distributed cloud for Internet of Things computations , 2016, 2016 Cloudification of the Internet of Things (CIoT).
[56] Rabindra K. Barik,et al. FogGrid: Leveraging Fog Computing for Enhanced Smart Grid Network , 2017, 2017 14th IEEE India Council International Conference (INDICON).
[57] Rodrigo Roman,et al. From SMOG to Fog: A security perspective , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).
[58] Peter Kilpatrick,et al. Challenges and Opportunities in Edge Computing , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).
[59] Kang Kai,et al. Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues , 2016 .
[60] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[61] Jiannong Cao,et al. Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Things , 2017, IEEE Access.
[62] Sandeep K. Sood,et al. Identification of malicious edge devices in fog computing environments , 2017, Inf. Secur. J. A Glob. Perspect..
[63] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[64] Chuan Pham,et al. A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing , 2014, 2015 International Conference on Information Networking (ICOIN).
[65] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[66] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[67] Genya Ishigaki,et al. Fog Computing: Towards Minimizing Delay in the Internet of Things , 2017, 2017 IEEE International Conference on Edge Computing (EDGE).
[68] Sudip Misra,et al. Assessment of the Suitability of Fog Computing in the Context of Internet of Things , 2018, IEEE Transactions on Cloud Computing.
[69] David Palma,et al. Fog Computing in Healthcare–A Review and Discussion , 2017, IEEE Access.