Architecture for Privacy in Cloud of Things
暂无分享,去创建一个
[1] Klaus Wehrle,et al. The Cloud Needs Cross-Layer Data Handling Annotations , 2013, 2013 IEEE Security and Privacy Workshops.
[2] Arto Salomaa,et al. Public-Key Cryptography , 1996, Texts in Theoretical Computer Science. An EATCS Series.
[3] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[4] Geoffrey Fox,et al. Architecture and measured characteristics of a cloud based internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).
[5] Klaus Wehrle,et al. Towards Data Handling Requirements-Aware Cloud Computing , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[6] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[7] Eui-Nam Huh,et al. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved , 2014, Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th - 18th January, 2014.
[8] Artemis Moroni,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[9] Klaus Wehrle,et al. Delegation-based authentication and authorization for the IP-based Internet of Things , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[10] Dick Hardt,et al. The OAuth 2.0 Authorization Framework , 2012, RFC.
[11] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[12] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[13] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[14] Nadeem Javaid,et al. M-GEAR: Gateway-Based Energy-Aware Multi-hop Routing Protocol for WSNs , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[15] Klaus Wehrle,et al. SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators , 2013, Trusted Cloud Computing.
[16] Jorge Sá Silva,et al. Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.
[17] Hannes Tschofenig,et al. Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things , 2016, RFC.
[18] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[19] Eric Rescorla,et al. Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP) , 2010, RFC.
[20] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[21] Klaus Wehrle,et al. A comprehensive approach to privacy in the cloud-based Internet of Things , 2016, Future Gener. Comput. Syst..
[22] Qian Zhu,et al. IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[23] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[24] Jari Arkko,et al. End-to-end security for sleepy smart object networks , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.