-
1
-
-
0042930292
-
Computer security in these uncertain times: The need for a new approach
-
COMPSEC: London, UK
-
Angell, I. 1993. "Computer security in these uncertain times: the need for a new approach," in Proceedings of The Tenth World Conference on Computer Security, Audit and Control, COMPSEC: London, UK, pp. 382-388.
-
(1993)
Proceedings of the Tenth World Conference On Computer Security, Audit and Control
, pp. 382-388
-
-
Angell, I.1
-
2
-
-
33644511399
-
Collaborative business and data privacy: Toward a cyber-control?
-
Biennier, F., and Favrel, J. 2005. "Collaborative business and data privacy: Toward a cyber-control?," Computers in Industry (56:4), pp 361-370.
-
(2005)
Computers In Industry
, vol.56
, Issue.4
, pp. 361-370
-
-
Biennier, F.1
Favrel, J.2
-
3
-
-
84866627419
-
Fog computing and its role in the internet of things
-
(MCC '12), Helsinki, FI
-
Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. 2012. "Fog computing and its role in the internet of things," in MCC workshop on Mobile Cloud Computing (MCC '12): Helsinki, FI, pp. 13-16.
-
(2012)
In MCC Workshop On Mobile Cloud Computing
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
4
-
-
80053978911
-
Secure cloud computing: Benefits, risks and controls
-
(ISSA), Johannesburg, ZA
-
Carroll, M., van der Merwe, A., and Kotze, P. 2011. "Secure cloud computing: Benefits, risks and controls," in Information Security South Africa (ISSA): Johannesburg, ZA, pp. 1-9.
-
(2011)
In Information Security South Africa
, pp. 1-9
-
-
Carroll, M.1
van der Merwe, A.2
Kotze, P.3
-
5
-
-
0040645933
-
Risks in the use of information technology within organizations
-
Dhillon, G., and Backhouse, J. 1996. "Risks in the use of information technology within organizations," International Journal of Information Management: The Journal for Information Professionals (16:1), pp 65-74.
-
(1996)
International Journal of Information Management: The Journal For Information Professionals
, vol.16
, Issue.1
, pp. 65-74
-
-
Dhillon, G.1
Backhouse, J.2
-
6
-
-
0002698747
-
Technical opinion: Information system security management in the new millennium
-
Dhillon, G., and Backhouse, J. 2000. "Technical opinion: Information system security management in the new millennium," Communications of the ACM (43:7), pp 125-128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
7
-
-
84883732282
-
Mobile fog: A programming model for large-scale applications on the internet of things
-
(MCC '13)
-
Hong, K., Lillethun, D., Ramachandran, U., Ottenwalder, B., and Koldehofe, B. 2013. "Mobile fog: a programming model for large-scale applications on the internet of things," in Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing (MCC '13), pp. 15-20.
-
(2013)
In Proceedings of the Second ACM SIGCOMM Workshop On Mobile Cloud Computing
, pp. 15-20
-
-
Hong, K.1
Lillethun, D.2
Ramachandran, U.3
Ottenwalder, B.4
Koldehofe, B.5
-
8
-
-
84889007545
-
Hardware and embedded security in the context of internet of things
-
Berlin, DE
-
Kanuparthi, A., Karri, R., and Addepalli, S. 2013. "Hardware and embedded security in the context of internet of things," in Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles: Berlin, DE, pp. 61-64.
-
(2013)
In Proceedings of the 2013 ACM Workshop On Security, Privacy & Dependability For Cyber Vehicles
, pp. 61-64
-
-
Kanuparthi, A.1
Karri, R.2
Addepalli, S.3
-
9
-
-
70349309706
-
Data security in the world of cloud computing
-
Kaufman, L. 2009. "Data security in the world of cloud computing," IEEE Security & Privacy (7:4), pp 61-64.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.1
-
10
-
-
84889076773
-
Reliability in the utility computing era: Towards reliable Fog computing
-
(IWSSIP), Year, Bucharest, RO
-
Madsen, H., Albeanu, G., Burtschy, B., and Popentiu-Vladicescu, F. Year. "Reliability in the utility computing era: Towards reliable Fog computing," 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP), Bucharest, RO, 2013, pp. 43 - 46.
-
(2013)
2013 20th International Conference On Systems, Signals and Image Processing
, pp. 43-46
-
-
Madsen, H.1
Albeanu, G.2
Burtschy, B.3
Popentiu-Vladicescu, F.4
-
11
-
-
84887500045
-
An open framework for accessing Things as a service
-
(WPMC), Atlantic City, NJ
-
Mingozzi, E., Tanganelli, G., Vallati, C., and Di Gregorio, V. 2013. "An open framework for accessing Things as a service," in 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC): Atlantic City, NJ, pp. 1 - 5.
-
(2013)
In 2013 16th International Symposium On Wireless Personal Multimedia Communications
, pp. 1-5
-
-
Mingozzi, E.1
Tanganelli, G.2
Vallati, C.3
Di Gregorio, V.4
-
12
-
-
84937420058
-
An analysis of the cloud computing security problem
-
Sydney, AU
-
Morsy, A., Grundy, J., and Mueller, I. 2010. "An analysis of the cloud computing security problem," in 17th Asia- Pacific Software Engineering Conference (APSEC 2010) Cloud Workshop: Sydney, AU, pp. 8-15.
-
(2010)
In 17th Asia- Pacific Software Engineering Conference (APSEC 2010) Cloud Workshop
, pp. 8-15
-
-
Morsy, A.1
Grundy, J.2
Mueller, I.3
-
13
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
Chicago, Ill
-
Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., and Iacono, L. 2011. "All your clouds are belong to us: Security analysis of cloud management interfaces," in Proceedings of the 3rd ACM Workshop on Cloud Computing (CCSW '11) Security Workshop: Chicago, Ill.
-
(2011)
In Proceedings of the 3rd ACM Workshop On Cloud Computing (CCSW '11) Security Workshop
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Iacono, L.6
-
14
-
-
84893536575
-
Adage mobile services for ITS infrastructure
-
(ITST), Tampere, FI
-
Zaborovskiy, V., Lukashin, A., Popov, S., and Vostrov, A. 2013. "Adage mobile services for ITS infrastructure," in 2013 13th International Conference on ITS Telecommunications (ITST): Tampere, FI, pp. 127-132.
-
(2013)
In 2013 13th International Conference On ITS Telecommunications
, pp. 127-132
-
-
Zaborovskiy, V.1
Lukashin, A.2
Popov, S.3
Vostrov, A.4
-
15
-
-
84880905874
-
Improving web sites performance using edge servers in fog computing architecture
-
CA
-
Zhu, J., Chan, d., Prabhu, M., Natarajan, P., Hu, H., and Bonomi, F. 2013. "Improving web sites performance using edge servers in fog computing architecture," in 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE): Redwood City, CA, pp. 320-323.
-
(2013)
In 2013 IEEE 7th International Symposium On Service Oriented System Engineering (SOSE): Redwood City
, pp. 320-323
-
-
Zhu, J.1
Chan, D.2
Prabhu, M.3
Natarajan, P.4
Hu, H.5
Bonomi, F.6
|