A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture

[1]  Bo Hu,et al.  A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.

[2]  Daiyuan Peng,et al.  Resource allocation for security services in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[3]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[4]  Andreas Krüger,et al.  The design of large real-time systems: the time-triggered approach , 1995, Proceedings 16th IEEE Real-Time Systems Symposium.

[5]  Dong Seong Kim,et al.  End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach , 2010, 2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing.

[6]  Daniel J. Abadi,et al.  Data Management in the Cloud: Limitations and Opportunities , 2009, IEEE Data Eng. Bull..

[7]  H. H. Xia An analytical model for predicting path loss in urban and suburban environments , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.

[8]  Kwang-Cheng Chen,et al.  Information Fusion to Defend Intentional Attack in Internet of Things , 2014, IEEE Internet of Things Journal.

[9]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[10]  Dmytro Dyachuk,et al.  Maximizing Cloud Providers' Revenues via Energy Aware Allocation Policies , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[11]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[12]  Louiqa Raschid,et al.  Managing on-demand computing services with heterogeneous customers , 2013, 2013 Winter Simulations Conference (WSC).

[13]  Ming-Chuan Ni,et al.  Selective Rerouting Using Simulated Steady State System Data , 1997, Winter Simulation Conference Proceedings,.

[14]  Lee W. McKnight,et al.  Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces , 2012 .

[15]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[16]  Dimitrios Katsaros,et al.  Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.

[17]  Jean-Claude Laprie,et al.  Dependability of computer systems: concepts, limits, improvements , 1995, Proceedings of Sixth International Symposium on Software Reliability Engineering. ISSRE'95.

[18]  Hamid Sharif,et al.  A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.

[19]  Shin-Ming Cheng,et al.  Sequential Defense Against Random and Intentional Attacks in Complex Networks , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.

[20]  Alfred O. Hero,et al.  Assessing and safeguarding network resilience to nodal attacks , 2014, IEEE Communications Magazine.

[21]  Tyson T. Brooks,et al.  Principles for Implementing a Service-Oriented Enterprise Architecture , 2009 .

[22]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .