Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …
A survey of virtual machine management in edge computing
Many edge computing systems rely on virtual machines (VMs) to deliver their services. It is
challenging, however, to deploy the virtualization mechanisms on edge computing hardware …
challenging, however, to deploy the virtualization mechanisms on edge computing hardware …
[PDF][PDF] International journal of advanced research in computer science and software engineering
AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
A multi-property method to evaluate trust of edge computing based on data driven capsule network
C Jia, K Lin, J Deng - IEEE INFOCOM 2020-IEEE Conference …, 2020 - ieeexplore.ieee.org
As one of the computing paradigms in the process of traditional cloud computing turning to
marginalization, edge computing is designed to meet the requirements of edge devices such …
marginalization, edge computing is designed to meet the requirements of edge devices such …
Trusted path between two entities in Cloud
Trust plays an important role in the security of resources of the emerging technology called
Cloud. To develop a strong trust there has to be a strong trust path between two entities. In …
Cloud. To develop a strong trust there has to be a strong trust path between two entities. In …
Fog computing in Internet of Things-based E-health system—challenges and opportunities for managing health-associated data
M Maksimovic - Handbook of e-Business Security, 2018 - taylorfrancis.com
This chapter represents the essence of Internet of Things (IoT)-supported healthcare, lists
the types and structures of health-related data, and considers and analyzes the present …
the types and structures of health-related data, and considers and analyzes the present …
移动边缘计算安全防御研究
陈璐, 汤红波, 游伟, 柏溢 - 网络与信息安全学报, 2021 - infocomm-journal.com
移动边缘计算(Mobile Edge Computing, MEC) 通过进一步将电信蜂窝网延伸至其他无线接入
网络, 可以有效地解决传统网络中回程链路负载过重, 时延较长的问题. 但由于MEC …
网络, 可以有效地解决传统网络中回程链路负载过重, 时延较长的问题. 但由于MEC …
[PDF][PDF] Secure allocation of resources in cloud using trust
Cloud is the recent emerging technology in all aspects. The basic concern with the usage of
this Cloud Technology is security. Security poses a major drawback with data storage …
this Cloud Technology is security. Security poses a major drawback with data storage …
[PDF][PDF] 클라우드 연합 형성: 기관 신뢰도와 분산 신뢰도 평가를 통한 요인, 요구사항, 과제및 현재 동향 지원
WY Gebrealif - 2023 - s-space.snu.ac.kr
저작자표시-비영리-변경금지 2.0 대한민국 이용자는 아래의 조건을 따르는 경우에 한하여 자유롭
Page 1 저작자표시-비영리-변경금지 2.0 대한민국 이용자는 아래의 조건을 따르는 경우에 한하여 …
Page 1 저작자표시-비영리-변경금지 2.0 대한민국 이용자는 아래의 조건을 따르는 경우에 한하여 …
[PDF][PDF] Community Cloud: an Infrastructure Solution for a Logistics Project
Cloud computing is becoming more and more adopted as infrastructure for providing service
oriented solutions. Such a solution is especially critical when software and hardware …
oriented solutions. Such a solution is especially critical when software and hardware …