Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
edge computing
biblio
Security issues in fog computing using vehicular cloud
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Scalability
Vehicular cloud
vehicular ad hoc networks
VANET Cloud
VANET
V2V
V2I
Traffic Safety
security issues
security
authentication
Resiliency
pubcrawl
I2V
Fog computing
edge computing
delays
data privacy
computer architecture
Cloud Computing
biblio
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Fog computing
telecommunication security
Servers
security system
security service
security places
security
Scalability
Resiliency
pubcrawl
latency problems
latency issues
fog-computing requirements
fog servers
Fog Computing and Security
authentication
entry point
end devices
efficient mutual authentication scheme
edge resources
edge devices
edge computing
Cryptography
Cryptographic Protocols
computer architecture
cloud computing services
Cloud Computing
Authentication schemes
Authentication Protocols
biblio
Privacy-preserving fog computing paradigm
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Privacy in Fog
Software Architecture
security of data
security assessment
security
Scalability
Resiliency
pubcrawl
privacy-preserving fog computing paradigm
Privacy Threats
Cloud Computing
privacy
IoT
Intelligent sensors
fog nodes
fog computing architecture
Fog computing
edge computing
data privacy
computer architecture
biblio
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
mobile computing
healthcare facilities
healthcare information system environment
high-profile attacks
medical control systems
medical data
medical devices
medical information systems
Medical services
healthcare cloud-lets
mobile services
Protocols
pubcrawl
Resiliency
Scalability
security
security of data
Service Provisioning
edge computing
autonomic zero-knowledge security provisioning model
AZSPM
Cloud Computing
cloud-based solutions
cloud-hoarding
Computational modeling
cyber security
different healthcare enterprises
atomic security components
Fog computing
FOG computing environment
fog environments
fog security administration
fully sand boxed environment
health care
health informatics industry
Health Information Systems
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
optimal datacenter
Trust models
Time factors
Service Broker
security-based service broker policy
security strength
security risks
security of data
security
Scalability
SbSBP
resource allocation
Resiliency
quantized security
pubcrawl
personal computers
available service providers
online Internet of Things services
load balancing
Internet of Things
Indexes
Heuristic algorithms
FOG computing environment
Fog computing
enhanced heterogeneity
edge computing
decision-making process
Decision Making
computing servers
computer centres
Computational modeling
Cloud Computing
biblio
Secure the internet of things with challenge response authentication in fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog computing based security system
VPN server
Virtual private networks
virtual private network
Servers
security of data
security
IoT system
IoT devices
Internet of Things
authentication
Fog computing
FOCUS system
edge computing
distributed denial of service attacks
DDoS Attacks
computer network security
Computer crime
Cloud Computing
challenge-response authentication
biblio
A data protection model for fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog-based privacy-aware role based access control
security of data
security
Scalability
Resiliency
region-based trust-aware model
RBTA model
pubcrawl
Mobility
IoT
Internet of Things
FPRBAC
Access Control
fog security
fog location
Fog computing
edge computing
Data Security
data protection model
Data protection
Data models
Computational modeling
Cloud Computing
biblio
Fog computing and security issues: A review
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
Data Security
security of data
privacy
mobile computing
IoT
Internet of Things
IDS
fog computing technology
edge computing
DoS
pubcrawl
data privacy
computing services
Computers
cloud computing paradigm
Cloud Computing
Scalability
Resiliency
security
Fog computing
biblio
A security aware scheduling in fog computing by hyper heuristic algorithm
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
scheduling
Internet of Things
job scheduling
latency
Processor scheduling
pubcrawl
Resiliency
resource allocation
Scalability
integrity parameter
security
security aware scheduling
Security Heuristics
security of data
security overhead
sensor nodes
Task Analysis
data mining technique
authorisation
average energy consumption
Cloud Computing
computational overhead
confidentiality parameter
CPU utilization
data integrity
Data mining
authentication parameter
edge computing
Fog computing
fog devices
heterogeneous distributed environment
heuristic algorithm
Heuristic algorithms
hyper heuristic algorithm
biblio
A Scalable and Privacy-Aware IoT Service for Live Video Analytics
Submitted by grigby1 on Thu, 02/15/2018 - 11:39am
Metrics
user privacy in the cloud
User behavior
Scalability
Resiliency
resilience
pubcrawl
privacy protection
Privacy Mediator
privacy
AI
Human Factors
human factor
Human behavior
face recognition
edge computing
cloudlet
Cloud Computing
Artificial Intelligence
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »