Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fog computing
biblio
A Security Scheme for Fog Computing Environment of IoT
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
Fog computing
IoT
pubcrawl
resilience
Resiliency
Scalability
security
security scheme
biblio
Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
resilience
virtualization technologies
Virtualization
use-case scenarios
Unikernels
technology development
Servers
security of data
security
Scalability
RTOS
Resiliency
Pervasive Computing Security
real time operating systems
pubcrawl
operating systems (computers)
open security issues
Fog computing
edge computing perspectives
edge computing
Containers
computer architecture
Cloud Computing
biblio
Chaos-Based Delay-Constrained Green Security Communications for Fog-Enabled Information-Centric Multimedia Network
Submitted by grigby1 on Tue, 01/21/2020 - 11:28am
Information Centric Networks
telecommunication security
Streaming media
Scalability
Resiliency
resilience
Reed-Solomon codes
pubcrawl
network edge capability
multimedia streams
media streaming
internet
chaos-based delay-constrained green security communications
Information Centric Network
ICMN
fog-enabled Information-Centric Multimedia Network
Fog computing
encryption
edge computing
Cryptography
content-centric features
chaotic encryption
chaotic communication
biblio
Protecting the Internet of Things with Security-by-Contract and Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
IoT
SxC framework
Software
Smart homes
Smart Home
security-by-contract
security
Scalability
Resiliency
pubcrawl
IoT systems
IoT devices
IoT device contract
Cloud Computing
Internet of Things
human beings lives
home automation
fog computing distributed paradigm
Fog Computing and Security
Fog computing
edge computing
contracts
contract-policy matching
consolidated reality
computer network security
biblio
Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
natural gas technology
while broad scenarios
smart port
smart offshore oil
smart airport
security threats
security of data
security issues
security
sea ports
Scalability
Resiliency
pubcrawl
oil technology
offshore installations
Airports
multiaccess edge computing paradigms
IoT devices
Internet of Things
general security requirements
gas extraction field
Fog Computing and Security
Fog computing
FMEC solutions
edge computing
critical infrastructures
communication technologies
Cloud Computing
CI
biblio
A Secure Fog-Cloud Based Architecture for MIoT
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
medical data
Temperature sensors
Software Architecture
security of data
security issues
secure fog-cloud based architecture
Scalability
Resiliency
pubcrawl
Monitoring
MIoT devices
MIoT architectures
MIoT
Medical services
medical Internet of Things
attribute-based encryption
medical computing
medial data
Internet of Things
healthcare services
healthcare providers
Healthcare
health care
Fog Computing and Security
Fog computing
Data Security
computer architecture
Cloud Computing
Biomedical monitoring
biblio
Security Embedded Offloading Requirements for IoT-Fog Paradigm
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
IoT-Fog based systems
Task Offloading
security provision
security embedded task offloading requirements
security embedded offloading requirements
Scalability
resource allocation
Resiliency
pubcrawl
propagation latencies
offloading security
middleware technologies
middleware
Middle-ware
IoT-Fog paradigm
Cloud Computing
IoT-Fog based future communication networks
Internet of Things (IoT)
Internet of Things
internet
information processing
future smart networks
Fog Computing and Security
Fog computing
embedded security requirements
edge computing
delay tolerant networks
Data protection
data management
computer network security
biblio
Distributed Access Control with Outsourced Computation in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
encryption
traditional cloud computing
security of data
Scalability
Resiliency
pubcrawl
performance evaluation
outsourced computation
network terminal devices
IoT
Internet of Things
fog device
Fog Computing and Security
fine-grained access control
Fog computing
edge computing
distributed processing
distributed access control
data storage
Cryptography
Computational efficiency
computational complexity
Cloud Computing
big data transmission
Big Data
attribute based-encryption
Access Control
security
biblio
Cutting Throughput with the Edge: App-Aware Placement in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
mobile computing
generation IoT-based services
greedy algorithm
greedy algorithms
integer programming
Internet of Things
IoT
IoT applications
location awareness
mixed integer nonlinear optimisation
FogAtlas
nonlinear programming
optimization
placement
pubcrawl
raw data transfers
Resiliency
resource allocation
Scalability
delays
Bandwidth
central cloud
Cloud Computing
cloud computing technology
cloud module
communication demands
Computation offloading
Containers
app-aware placement
dynamic computation
edge computing
edge devices
fog application
Fog computing
Fog Computing and Security
fog computing platform
fog module
biblio
Fog-Based Internet of Things: A Security Scheme
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
IoT devices
traditional data center
time-sensitive applications
security scheme
Scalability
response time
Resiliency
pubcrawl
Protocols
nearby light-weight middleware
MQTT protocol
MQTT
middleware
Fog computing
IoT
Internet of Things
Internet of Thing stack models
fog-based Internet of Things
Fog Computing and Security
Fog based IoT
edge computing
computer network security
computer architecture
Cloud-based IoT
Cloud Computing
security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »