A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture
暂无分享,去创建一个
[1] Bo Hu,et al. A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.
[2] Daiyuan Peng,et al. Resource allocation for security services in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[3] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[4] Andreas Krüger,et al. The design of large real-time systems: the time-triggered approach , 1995, Proceedings 16th IEEE Real-Time Systems Symposium.
[5] Dong Seong Kim,et al. End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach , 2010, 2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing.
[6] Daniel J. Abadi,et al. Data Management in the Cloud: Limitations and Opportunities , 2009, IEEE Data Eng. Bull..
[7] H. H. Xia. An analytical model for predicting path loss in urban and suburban environments , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.
[8] Kwang-Cheng Chen,et al. Information Fusion to Defend Intentional Attack in Internet of Things , 2014, IEEE Internet of Things Journal.
[9] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[10] Dmytro Dyachuk,et al. Maximizing Cloud Providers' Revenues via Energy Aware Allocation Policies , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[11] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[12] Louiqa Raschid,et al. Managing on-demand computing services with heterogeneous customers , 2013, 2013 Winter Simulations Conference (WSC).
[13] Ming-Chuan Ni,et al. Selective Rerouting Using Simulated Steady State System Data , 1997, Winter Simulation Conference Proceedings,.
[14] Lee W. McKnight,et al. Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces , 2012 .
[15] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[16] Dimitrios Katsaros,et al. Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.
[17] Jean-Claude Laprie,et al. Dependability of computer systems: concepts, limits, improvements , 1995, Proceedings of Sixth International Symposium on Software Reliability Engineering. ISSRE'95.
[18] Hamid Sharif,et al. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.
[19] Shin-Ming Cheng,et al. Sequential Defense Against Random and Intentional Attacks in Complex Networks , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.
[20] Alfred O. Hero,et al. Assessing and safeguarding network resilience to nodal attacks , 2014, IEEE Communications Magazine.
[21] Tyson T. Brooks,et al. Principles for Implementing a Service-Oriented Enterprise Architecture , 2009 .
[22] Peter Friess,et al. Internet of Things Strategic Research Roadmap , 2011 .