CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems: Authentication
暂无分享,去创建一个
Costin Badica | Mirjana Ivanovic | Milos Radovanovic | Sasa Pesic | Milenko Tosic | Ognjen Ikovic | Dragan Boskovic | M. Ivanović | Miloš Radovanović | Saša Pesic | M. Tosic | Ognjen Ikovic | D. Boskovic | C. Bǎdicǎ
[1] Ahmad-Reza Sadeghi,et al. Short paper: lightweight remote attestation using physical functions , 2011, WiSec '11.
[2] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[3] Marco Chiappetta,et al. Real time detection of cache-based side-channel attacks using hardware performance counters , 2016, Appl. Soft Comput..
[4] Kouichi Sakurai,et al. A new security middleware architecture based on fog computing and cloud to support IoT constrained devices , 2017, IML.
[5] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[6] Panagiotis Papadimitratos,et al. Fast Exclusion of Errant Devices from Vehicular Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[7] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[8] Luca Veltri,et al. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview , 2013, Algorithms.
[9] Ramesh Karri,et al. Sensor physical unclonable functions , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[10] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[11] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[12] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[13] Ramesh Karri,et al. Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[14] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[15] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[16] Michail Maniatakos,et al. ConFirm: Detecting firmware modifications in embedded systems using Hardware Performance Counters , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[17] Jia Guo,et al. A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..
[18] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[19] Saneeha Ahmed,et al. Misbehaviour detection in vehicular networks using logistic trust , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[20] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[21] Tanupriya Choudhury,et al. Fog computing: Common security issues and proposed countermeasures , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).
[22] Ramesh Karri,et al. BRAIN: BehavioR Based Adaptive Intrusion Detection in Networks: Using Hardware Performance Counters to Detect DDoS Attacks , 2016, 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID).
[23] Nur Izura Udzir,et al. A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection , 2011 .
[24] Simon Parkinson,et al. Fog computing security: a review of current applications and security solutions , 2017, Journal of Cloud Computing.
[25] Xiaoyong Li,et al. A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion , 2018, IEEE Access.
[26] Michael Franz,et al. Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .
[27] Antonio Iera,et al. A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[28] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[29] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[30] Claudia Keser,et al. Can We Manage Trust? , 2005, iTrust.
[31] Ramjee Prasad,et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.