Wearable IoT Data Architecture
暂无分享,去创建一个
[1] Victor Khomenko,et al. Factored Planning: From Automata to Petri Nets , 2013, ACSD.
[2] Jatinder Singh,et al. On middleware for emerging health services , 2014, Journal of Internet Services and Applications.
[3] Elisa Bertino,et al. IdentiDroid: Android can finally Wear its Anonymous Suit , 2014, Trans. Data Priv..
[4] Rong Yang,et al. A Petri Net-Based Approach to Service Composition and Monitoring in the IOT , 2014, 2014 Asia-Pacific Services Computing Conference.
[5] Elisa Bertino,et al. Data Security and Privacy in the IoT , 2016, EDBT.
[6] Edoardo Pignotti,et al. Trusted tiny things: making the internet of things more transparent to users , 2013, ASPI '13.
[7] Peeter Kool,et al. Service-Oriented Middleware Architecture for Mobile Personal Health Monitoring , 2011, MobiHealth.
[8] Mirjana Maksimovic,et al. A custom Internet of Things healthcare system , 2015, 2015 10th Iberian Conference on Information Systems and Technologies (CISTI).
[9] Klaus Wehrle,et al. Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.
[10] Marianne Winslett,et al. Preventing history forgery with secure provenance , 2009, TOS.
[11] Najah AbuAli,et al. Internet of nano-things healthcare applications: Requirements, opportunities, and challenges , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[12] Mangal Sain,et al. Middleware for ubiquitous Healthcare Information system , 2009, 2009 11th International Conference on Advanced Communication Technology.
[13] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[14] Mohammed Elkoutbi,et al. Modeling and enforcing security and service control policies using FlexRFID middleware: Healthcare scenarios , 2014, 2014 Science and Information Conference.
[15] David M. Eyers,et al. Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.
[16] Fabian Monrose,et al. Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches , 2012, IEEE Transactions on Information Forensics and Security.
[17] Lujo Bauer,et al. More than skin deep: measuring effects of the underlying model on access-control system usability , 2011, CHI.
[18] Akbar Sheikh Akbari,et al. Application of ZigBee and RFID Technologies in Healthcare in Conjunction with the Internet of Things , 2013, MoMM '13.
[19] Shingo Yamaguchi,et al. An analysis system of IoT services based on agent-oriented Petri net PN2 , 2016, 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW).
[20] Junshan Zhang,et al. Robust and Cost-Effective Design of Cyber-Physical Systems: An Optimal Middleware Deployment Approach , 2016, IEEE/ACM Transactions on Networking.
[21] Jeannette M. Wing. CHAPTER 9 – Scenario Graphs Applied to Network Security , 2008 .
[22] George Suciu,et al. An overview of cloud middleware services for interconnection of healthcare platforms , 2014, 2014 10th International Conference on Communications (COMM).