A Cross-Device Architecture for Modelling Authentication Features in IoT Applications
暂无分享,去创建一个
[1] Yue Xu,et al. A unified face identification and resolution scheme using cloud computing in Internet of Things , 2018, Future Gener. Comput. Syst..
[2] Mimoun Moussaoui,et al. MDA Approach to Automate Code Generation for Mobile Applications , 2016 .
[3] Alberto Rodrigues da Silva,et al. Evaluation of XIS-Mobile, a Domain Specific Language for Mobile Application Development , 2014 .
[4] Daladier Jabba,et al. Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare , 2017, Sensors.
[5] Vicente García-Díaz,et al. Midgar: Domain-Specific Language to Generate Smart Objects for an Internet of Things Platform , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[6] Andrea Bosin. An SOA-Based Model for the Integrated Provisioning of Cloud and Grid Resources , 2012, Adv. Softw. Eng..
[7] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[8] Yann Bachy,et al. Smart-TV Security Analysis: Practical Experiments , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[9] Darwin Alulema,et al. A DSL for the Development of Heterogeneous Applications , 2017, 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[10] Zuohua Ding,et al. Online Prediction and Improvement of Reliability for Service Oriented Systems , 2016, IEEE Transactions on Reliability.
[11] Luca Mainetti,et al. A Software Architecture Enabling the Web of Things , 2015, IEEE Internet of Things Journal.
[12] Marilyn Wolf,et al. Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems , 2018, Proceedings of the IEEE.
[13] Luis E. Anido-Rifón,et al. An Open Architecture to Support Social and Health Services in a Smart TV Environment , 2017, IEEE Journal of Biomedical and Health Informatics.
[14] Alok Mishra,et al. Simplified software inspection process in compliance with international standards , 2009, Comput. Stand. Interfaces.
[15] Victor I. Chang,et al. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.
[16] Antonio Vallecillo,et al. Model-driven performance analysis of rule-based domain specific visual models , 2013, Inf. Softw. Technol..
[17] Glenn R. Cook,et al. New Pathways in Identity Management , 2010, IEEE Security & Privacy.
[18] Chin-Yu Huang,et al. Optimal Weighted Combinational Models for Software Reliability Estimation and Analysis , 2014, IEEE Transactions on Reliability.
[19] Danilo Suiama,et al. A Method for Identifying and Analyzing Authentication Mechanisms and a Case Study , 2011 .
[20] Bin Ren,et al. Medical Monitoring and Managing Application of the Information Service Cloud System Based on Internet of Things , 2014, J. Softw..
[21] Jianli Pan,et al. Future Edge Cloud and Edge Computing for Internet of Things Applications , 2018, IEEE Internet of Things Journal.
[22] James M. Bieman,et al. How Software Designs Decay: A Pilot Study of Pattern Evolution , 2007, First International Symposium on Empirical Software Engineering and Measurement (ESEM 2007).
[23] N. Jeyanthi,et al. Security Breaches and Threat Prevention in the Internet of Things , 2017 .
[24] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[25] Kyung Sup Kwak,et al. An Internet of Things-based health prescription assistant and its security system design , 2017, Future Gener. Comput. Syst..
[26] Alok Mishra,et al. Software quality assurance models in small and medium organisations: a comparison , 2006, Int. J. Inf. Technol. Manag..