메뉴 건너뛰기




Volumn , Issue , 2014, Pages 185-189

IoT-security approach analysis for the novel nutrition-based vegetable production and distribution system

Author keywords

Big Data; Computer Science; Data Analysis; Data systems; IoT

Indexed keywords

BIG DATA; COMPUTER SCIENCE; DATA REDUCTION; HETEROGENEOUS NETWORKS; NUTRITION; USER EXPERIENCE; VEGETABLES;

EID: 84918548949     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IIAI-AAI.2014.47     Document Type: Conference Paper
Times cited : (6)

References (35)
  • 7
    • 69149090568 scopus 로고    scopus 로고
    • The pathologies of big data
    • Aug
    • A, Adamas, "The Pathologies of Big Data", Communications of the ACM, vol, 52, No, 8, Aug, 2009, pp, 36-44.
    • (2009) Communications of the ACM , vol.52 , Issue.8 , pp. 36-44
    • Adamas, A.1
  • 9
    • 84864621380 scopus 로고    scopus 로고
    • Trending: The promises and the challenges of big social data
    • ed, M, K. Gold, The University of Minnesota Press, Minneapolis, MN, Jul.15
    • L, Manovich, "Trending: The promises and the Challenges of Big Social Data", Debates in the Digital humanities, ed, M, K. Gold, The University of Minnesota Press, Minneapolis, MN, Jul. 15, 2011.
    • (2011) Debates in the Digital Humanities
    • Manovich, L.1
  • 15
    • 84890090758 scopus 로고    scopus 로고
    • Trade's idea of quantification
    • Ed, M. Candea, London: Routledge, Jun,19
    • B, Latour, "Trade's idea of quantification", The Social After Gabriel Trade: Debates and Assessments, Ed, M. Candea, London: Routledge, Jun, 19, 2011, pp, 145-162.
    • (2011) The Social after Gabriel Trade: Debates and Assessments , pp. 145-162
    • Latour, B.1
  • 16
    • 84880529760 scopus 로고    scopus 로고
    • Massachusetts Institute of Technology Press
    • L, Gitelman, "Raw Data" Is An Oxymoron, Massachusetts Institute of Technology Press, 2013.
    • (2013) Raw Data" is An Oxymoron
    • Gitelman, L.1
  • 18
    • 37949051554 scopus 로고    scopus 로고
    • United Nations, Nov,18, World Summit on the Information Society (WSIS)
    • World Summit on the Information Society (WSIS), The Tunis Agenda for the Information Society, United Nations, Nov, 18, 2005.
    • (2005) The Tunis Agenda for the Information Society
  • 20
    • 80755142700 scopus 로고    scopus 로고
    • Using food and agriculture cloud to improve value of food chain
    • Oct
    • Y, Satake, and T, Yamazaki, "Using Food and Agriculture Cloud to Improve Value of Food Chain", Fujitsu Sci, Tech, J. Vol, 47, No, 4, Oct, 2011, pp, 378-386.
    • (2011) Fujitsu Sci, Tech J. , vol.47 , Issue.4 , pp. 378-386
    • Satake, Y.1    Yamazaki, T.2
  • 21
    • 84860320532 scopus 로고    scopus 로고
    • Approaches to creating human-centric solutions
    • S, Wakana, and Y, Yaginuma, "Approaches to Creating Human-Centric Solutions", Fujitsu Sci, Tech, J. Vol, 48, No, 2, pp, 129-134, 2012.
    • (2012) Fujitsu Sci, Tech J. , vol.48 , Issue.2 , pp. 129-134
    • Wakana, S.1    Yaginuma, Y.2
  • 22
    • 84918585735 scopus 로고    scopus 로고
    • New Energy and Industrial Technology Developlment Organization
    • New Energy and Industrial Technology Developlment Organization http://www.nedo.go.jp
  • 23
    • 84918555760 scopus 로고    scopus 로고
    • Fujitsu Launches New "Akisai" Cloud for the Food and Agricultural Industries
    • Fujitsu Launches New "Akisai" Cloud for the Food and Agricultural Industries http://www.fujitsu.com/global/news/pr/archives/month/2012/20 120718-01.html
  • 24
    • 85152504598 scopus 로고    scopus 로고
    • Metrics-driven security objective decomposition for an e-health application with adaptive security management
    • Article No 6, ACM, New York, NY, USA
    • R, M, Savola and H, Abie, "Metrics-driven security objective decomposition for an e-health application with adaptive security management", In Proceedings of the International Workshop on Adaptive Security (ASPI '13), Article No 6, ACM, New York, NY, USA
    • Proceedings of the International Workshop on Adaptive Security (ASPI '13)
    • Savola, R.M.1    Abie, H.2
  • 25
    • 84880413059 scopus 로고    scopus 로고
    • Enforcing security mechanisms in the ip-based internet of things: An algorithmic overview
    • S, Cirani, G. Simone and L, Ferrari, "Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview." Algorithms 6, no, 2: 197-226, 2013
    • (2013) Algorithms , vol.6 , Issue.2 , pp. 197-226
    • Cirani, S.1    Simone, G.2    Ferrari, L.3
  • 26
    • 84879243749 scopus 로고    scopus 로고
    • Cyber-physical-social based security architecture for future internet of things
    • H, Ning and H, Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things," Advances in Internet of Things, Vol, 2 No, 1, pp, 1-7, 2012
    • (2012) Advances in Internet of Things , vol.2 , Issue.1 , pp. 1-7
    • Ning, H.1    Liu, H.2
  • 28
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things-new security and privacy challenges
    • January
    • R, H, Weber, "Internet of Things-New security and privacy challenges", Elsevier-Computer Law &Security Review, Volume 26, Issue 1, Pages 23-30, January 2010
    • (2010) Elsevier-Computer Law &Security Review , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 29
    • 66649083454 scopus 로고    scopus 로고
    • Data integrity and intrusion detection in wireless sensor networks
    • New Delhi, India, December
    • R, Acharya, K. Asha, "Data integrity and intrusion detection in wireless sensor networks", Proceedings of IEEE ICON 2008, New Delhi, India, December 2008.
    • (2008) Proceedings of IEEE ICON 2008
    • Acharya, R.1    Asha, K.2
  • 30
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • September
    • A, Juels, "RFID security and privacy: a research survey", IEEE Journal on Selected Areas in Communications, v.24 n.2, p.381-394, September 2006
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 34
    • 70449596680 scopus 로고    scopus 로고
    • IPv6 over low-power wireless personal area networks (6lowpans): Overview, assumptions, problem statement, and goals
    • August
    • N, Kushalnagar, G. Montenegro, and C, Schumacher, "IPv6 Over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals", IETF RFC 4919, August 2007.
    • (2007) IETF RFC 4919
    • Kushalnagar, N.1    Montenegro, G.2    Schumacher, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.