메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Secure and trusted cloud of things

Author keywords

Cloud of Things; Secure Cloud of Things; Secure Trusted Things as a Service; Security as a Service; Trust as a Service

Indexed keywords


EID: 84894503247     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INDCON.2013.6725878     Document Type: Conference Paper
Times cited : (38)

References (26)
  • 1
    • 78650921155 scopus 로고    scopus 로고
    • From today's INTRAnet of things to a future INTERnet of things: A wireless-and mobility related view
    • M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, "From today's INTRAnet of things to a future INTERnet of things: A wireless-and mobility related view", IEEE Wireless Communication, vol. 17, no. 6, pp. 44-51, 2010.
    • (2010) IEEE Wireless Communication , vol.17 , Issue.6 , pp. 44-51
    • Zorzi, M.1    Gluhak, A.2    Lange, S.3    Bassi, A.4
  • 2
    • 84886590860 scopus 로고    scopus 로고
    • Available online at
    • Libelium Unveils the Top 50 Internet of Things Applications, Available online at: http://www. itwire. com/ opinion-and-analysis/ beerfiles/54432- libeliumunveils-the-top-50-internet-of-things applications.
    • Libelium Unveils the Top 50 Internet of Things Applications
  • 3
    • 80955160447 scopus 로고    scopus 로고
    • That 'internet of things' thing
    • K. Ashton, "That 'Internet of Things' Thing", RFID Journal, Available at: www. rfidjournal. com/article/print/4986,2009.
    • (2009) RFID Journal
    • Ashton, K.1
  • 4
    • 82955227970 scopus 로고    scopus 로고
    • From internet of things towards cloud of things
    • ISBN: 978-1-4577-1385-9,DOI: 10. 1109/ ICCCT. 2011. 6075156
    • P. Parwekar,"From Internet of Things towards cloud of things", 2nd International Conference on Computer and Communication Technology (ICCCT), 2011, ISBN: 978-1-4577-1385-9,DOI: 10. 1109/ ICCCT. 2011. 6075156,pp. 329-333.
    • (2011) 2nd International Conference on Computer and Communication Technology (ICCCT) , pp. 329-333
    • Parwekar, P.1
  • 7
    • 79751511212 scopus 로고    scopus 로고
    • Whats new about cloud computing security
    • EECS Department, University of California, Berkeley
    • Y. Chen, V. Paxson, RH. Katz, "Whats new about cloud computing security," Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley, 2010.
    • (2010) Intech. Rep. UCB/EECS-2010-5
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 11
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Elsevier
    • S. V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, Elsevier, vol. 34, 2011, pp. 1-11.
    • (2011) Journal of Network and Computer Applications , vol.34 , pp. 1-11
    • Kavitha, S.V.1
  • 14
    • 33947266432 scopus 로고    scopus 로고
    • Implementing network security protocols based on elliptic curve cryptography
    • Istanbul, Turkey, May 20-21
    • Aydos, Savas, Koc, "Implementing Network Security Protocols based on Elliptic Curve Cryptography", Proceedings of the Fourth Symposium on Computer Networks (Istanbul, Turkey, May 20-21, 1999),pp: 130-139.
    • (1999) Proceedings of the Fourth Symposium on Computer Networks , pp. 130-139
    • Aydos1    Savas2    Koc3
  • 16
    • 84879831235 scopus 로고    scopus 로고
    • Lightweight cryptography for the internet of things
    • March-2011
    • Katagi, Masanobu,Moriai, Shiho,2011, "Lightweight Cryptography for the Internet of Things". ISO/IEC standard (RFC6114, March-2011).
    • (2011) ISO/IEC Standard , vol.RFC6114
    • Katagi1    Masanobu2    Moriai3    Shiho4
  • 17
    • 84886589663 scopus 로고    scopus 로고
    • Available at: nordsecmob. aalto. fi/ en/publications/theses-2012/sethi- mohit-thesis. pdf,2012
    • M. Sethi, "Security in Smart object Networks", Available at: nordsecmob. aalto. fi/ en/publications/theses-2012/sethi-mohit-thesis. pdf,2012.
    • Security in Smart Object Networks
    • Sethi, M.1
  • 18
    • 84894494954 scopus 로고    scopus 로고
    • IEEE P1636. 3/D1, 2008, Draft Standard for
    • IEEE P1636. 3/D1, 2008, Draft Standard for " Identity-based Public-key Cryptography using Pairings", DOI:http://grouper. ieee. org/ groups/1363/IBC/material/P1363. 3-D1-200805. pdf.
    • Identity-based Public-key Cryptography Using Pairings
  • 21
    • 69549116775 scopus 로고    scopus 로고
    • Identity-Based anonymous remote authentication for Value-Added services in mobile networks
    • J. Y. Sun, C. Z, Y. C. Zhang,Y. G. Fang, "Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks", IEEE Transactions on Vehicular Technology, vol. 58, no. 7, pp. 3508-3517, 2009.
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.7 , pp. 3508-3517
    • Sun, J.Y.1    Zhang, Y.C.2    Fang, Y.G.3
  • 25
    • 80054066376 scopus 로고    scopus 로고
    • Trust as a service: A framework for trust management in cloud environments
    • ISBN:978-3-642-24433-9,DOI: 10. 1007/978-3-642-24434-6-27
    • "Trust as a Service: A Framework for Trust Management in Cloud Environments", Web Information System Engineering-WISE 2011, pp. 314-321, ISBN:978-3-642-24433-9,DOI: 10. 1007/978-3-642-24434-6-27.
    • (2011) Web Information System Engineering-WISE , pp. 314-321


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.