-
1
-
-
0029368501
-
Different roles and mutual dependencies of data, information, and knowledge an AI perspective on their integration
-
Aamodt, A., & Nygard, M. (1995). Different roles and mutual dependencies of data, information, and knowledge an AI perspective on their integration. Data & Knowledge Engineering, 16(3), 191-222. doi:10.1016/0169-023X(95)00017-M
-
(1995)
Data & Knowledge Engineering
, vol.16
, Issue.3
, pp. 191-222
-
-
Aamodt, A.1
Nygard, M.2
-
2
-
-
79956318862
-
Enforcing end-to-end application security in the cloud
-
Springer Berlin Heidelberg
-
Bacon, J., Evans, D., Eyers, D. M., Migliavacca, M., Pietzuch, P., & Shand, B. (2010). Enforcing End-to-End Application Security in the Cloud. In Middleware 2010 (pp. 293-312). Springer Berlin Heidelberg. doi:10.1007/978-3-642-16955-7-15
-
(2010)
Middleware 2010
, pp. 293-312
-
-
Bacon, J.1
Evans, D.2
Eyers, D.M.3
Migliavacca, M.4
Pietzuch, P.5
Shand, B.6
-
3
-
-
84955471465
-
A scalable big stream cloud architecture for the internet of things. [IJSSOE]
-
Belli, L., Cirani, S., Davoli, L., Ferrari, G., Melegari, L., Monton, M., & Picone, M. (2015). A Scalable Big Stream Cloud Architecture for the Internet of Things. [IJSSOE]. International Journal of Systems and Service-Oriented Engineering, 5(4), 26-53. doi:10.4018/IJSSOE.2015100102
-
(2015)
International Journal of Systems and Service-Oriented Engineering
, vol.5
, Issue.4
, pp. 26-53
-
-
Belli, L.1
Cirani, S.2
Davoli, L.3
Ferrari, G.4
Melegari, L.5
Monton, M.6
Picone, M.7
-
4
-
-
84942924995
-
Design and deployment of an IoT application-oriented testbed
-
September
-
Belli, L., Cirani, S., Davoli, L., Gorrieri, A., Mancin, M., Picone, M., & Ferrari, G. (2015, September). Design and Deployment of an IoT Application-Oriented Testbed. IEEE Computer, 48(9), 32-40. doi:10.1109/MC.2015.253
-
(2015)
IEEE Computer
, vol.48
, Issue.9
, pp. 32-40
-
-
Belli, L.1
Cirani, S.2
Davoli, L.3
Gorrieri, A.4
Mancin, M.5
Picone, M.6
Ferrari, G.7
-
5
-
-
84930447062
-
An open-source cloud architecture for big stream iot applications
-
I. Podnar Žarko, K. Pripužić, & M. Serrano (Eds.), Springer International Publishing
-
Belli, L., Cirani, S., Davoli, L., Melegari, L., Monton, M., & Picone, M. (2015). An Open-Source Cloud Architecture for Big Stream IoT Applications. In I. Podnar Žarko, K. Pripužić, & M. Serrano (Eds.), Interoperability and Open-Source Solutions for the Internet of Things (Vol. 9001, pp. 73-88). Springer International Publishing; doi:10.1007/978-3-319-16546-2-7
-
(2015)
Interoperability and Open-Source Solutions for the Internet of Things
, vol.9001
, pp. 73-88
-
-
Belli, L.1
Cirani, S.2
Davoli, L.3
Melegari, L.4
Monton, M.5
Picone, M.6
-
6
-
-
84924154078
-
A graph-based cloud architecture for big stream real-time applications in the internet of things
-
Springer International Publishing
-
Belli, L., Cirani, S., Ferrari, G., Melegari, L., & Picone, M. (2014). A Graph-Based Cloud Architecture for Big Stream Real-Time Applications in the Internet of Things. In Advances in Service-Oriented and Cloud Computing (Vol. 508, pp. 91-105). Springer International Publishing; doi:10.1007/978-3-319-14886-1-10
-
(2014)
Advances in Service-Oriented and Cloud Computing
, vol.508
, pp. 91-105
-
-
Belli, L.1
Cirani, S.2
Ferrari, G.3
Melegari, L.4
Picone, M.5
-
7
-
-
84925450955
-
Fog computing: A platform for internet of things and analytics
-
Springer International Publishing
-
Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog Computing: A Platform for Internet of Things and Analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments (pp. 169-186). Springer International Publishing. doi:10.1007/978-3-319-05029-4-7
-
(2014)
Big Data and Internet of Things: A Roadmap for Smart Environments
, pp. 169-186
-
-
Bonomi, F.1
Milito, R.2
Natarajan, P.3
Zhu, J.4
-
8
-
-
84908646849
-
Performance evaluation of a sip-based constrained peer-to-peer overlay
-
Jul
-
Cirani, S., Davoli, L., Picone, M., & Veltri, L. (2014, Jul). Performance Evaluation of a SIP-based Constrained Peer-to-Peer Overlay. In 2014 IEEE International Conference on High Performance Computing Simulation (pp. 432-435). Doi:10.1109/HPCSim.2014.6903717
-
(2014)
2014 IEEE International Conference on High Performance Computing Simulation
, pp. 432-435
-
-
Cirani, S.1
Davoli, L.2
Picone, M.3
Veltri, L.4
-
9
-
-
84916934620
-
IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios
-
February
-
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., & Ferrari, G. (2015, February). IoT-OAS: An OAuth-based Authorization Service Architecture for Secure Services in IoT Scenarios. IEEE Sensors Journal, 15(2), 1224-1234. doi:10.1109/JSEN.2014.2361406
-
(2015)
IEEE Sensors Journal
, vol.15
, Issue.2
, pp. 1224-1234
-
-
Cirani, S.1
Picone, M.2
Gonizzi, P.3
Veltri, L.4
Ferrari, G.5
-
10
-
-
84904704703
-
CoSIP: A constrained session initiation protocol for the internet of things
-
Springer Berlin Heidelberg
-
Cirani, S., Picone, M., & Veltri, L. (2013). CoSIP: A Constrained Session Initiation Protocol for the Internet of Things. In Advances in Service-Oriented and Cloud Computing (Vol. 393, pp. 13-24). Springer Berlin Heidelberg; doi:10.1007/978-3-642-45364-9-2
-
(2013)
Advances in Service-Oriented and Cloud Computing
, vol.393
, pp. 13-24
-
-
Cirani, S.1
Picone, M.2
Veltri, L.3
-
11
-
-
84930428983
-
MjCoAP: An open-source lightweight Java coap library for internet of things applications
-
DOI: Springer International Publishing Switzerland
-
Cirani, S., Picone, M., & Veltri, L. (2015). mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications. In Interoperability and Open-Source Solutions for the Internet of Things. LNCS (Vol. 9001). DOI: Springer International Publishing Switzerland. doi:10.1007/978-3-319-16546-2-10
-
(2015)
Interoperability and Open-Source Solutions for the Internet of Things. LNCS
, vol.9001
-
-
Cirani, S.1
Picone, M.2
Veltri, L.3
-
14
-
-
84980353059
-
Federated identity and access management for the internet of things
-
Sep
-
Fremantle, P., Aziz, B., Scott, P., & Kopecky, J. (2014, Sep). Federated Identity and Access Management for the Internet of Things. In 3rd International Workshop on the Secure IoT. doi:10.1109/SIoT.2014.8
-
(2014)
3rd International Workshop on the Secure IoT
-
-
Fremantle, P.1
Aziz, B.2
Scott, P.3
Kopecky, J.4
-
15
-
-
77649261628
-
-
(Unpublished doctoral dissertation). Stanford University. Retrieved from
-
Gentry, C. (2009). A fully Homomorphic encryption scheme (Unpublished doctoral dissertation). Stanford University. Retrieved from http://crypto.stanford.edu/craig
-
(2009)
A Fully Homomorphic Encryption Scheme
-
-
Gentry, C.1
-
17
-
-
10044221068
-
-
Boston, MA, USA: Addison-Wesley Longman Publishing
-
Hohpe, G., & Woolf, B. (2003). Enterprise integration patterns: Designing, building, and deploying messaging solutions. Boston, MA, USA: Addison-Wesley Longman Publishing.
-
(2003)
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
-
-
Hohpe, G.1
Woolf, B.2
-
20
-
-
77956533053
-
Roles and security in a publish/subscribe network architecture
-
22-25 June
-
Lagutin, D., Visala, K., Zahemszky, A., Burbridge, T., & Marias, G. F. Roles and security in a publish/subscribe network architecture. In 2010 IEEE Symposium on Computers and Communications (pp. 68-74). 22-25 June 2010. Doi:10.1109/ISCC.2010.5546746
-
(2010)
2010 IEEE Symposium on Computers and Communications
, pp. 68-74
-
-
Lagutin, D.1
Visala, K.2
Zahemszky, A.3
Burbridge, T.4
Marias, G.F.5
-
21
-
-
84907379367
-
Storage challenge: Where will all that Big Data go?
-
Leavitt, N. (2013). Storage challenge: Where will all that Big Data go? Computer, 46(9), 22-25. doi:10.1109/ MC.2013.326
-
(2013)
Computer
, vol.46
, Issue.9
, pp. 22-25
-
-
Leavitt, N.1
-
22
-
-
84926189944
-
Low-latency service data aggregation using policy obligations
-
Jun IEEE
-
Marganiec, S. R., Tilly, M., & Janicke, H. (2014, Jun). Low-Latency Service Data Aggregation Using Policy Obligations. In 2014 IEEE International Conference on Web Services (pp. 526-533). IEEE.
-
(2014)
2014 IEEE International Conference on Web Services
, pp. 526-533
-
-
Marganiec, S.R.1
Tilly, M.2
Janicke, H.3
-
23
-
-
84928653182
-
-
Retrieved from
-
Medagliani, P., Leguay, J., Duda, A., Rousseau, F., Domingo, M., Dohler, M., ⋯ Dupont, O. (2014). Bringing IP to Low-power Smart Objects: the Smart Parking Case in the CALIPSO Project. Retrieved from http://www. ict-calipso.eu/
-
(2014)
Bringing IP to Low-power Smart Objects: The Smart Parking Case in the CALIPSO Project
-
-
Medagliani, P.1
Leguay, J.2
Duda, A.3
Rousseau, F.4
Domingo, M.5
Dohler, M.6
Dupont, O.7
-
25
-
-
84871762843
-
IaaS cloud architecture: From virtualized datacenters to federated cloud infrastructures
-
Moreno-Vozmediano, R., Montero, R. S., & Llorente, I. M. (2012). IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures. Computer, 45(12), 65-72. http://doi.ieeecomputersociety. org/10.1109/MC.2012.76 doi:10.1109/MC.2012.76
-
(2012)
Computer
, vol.45
, Issue.12
, pp. 65-72
-
-
Moreno-Vozmediano, R.1
Montero, R.S.2
Llorente, I.M.3
-
26
-
-
79951736167
-
S4: Distributed stream computing platform
-
Neumeyer, L., Robbins, B., Nair, A., & Kesari, A. (2010). S4: Distributed stream computing platform. In 2010 IEEE International Conference on Data Mining Workshops (pp. 170-177). doi:10.1109/ICDMW.2010.172
-
(2010)
2010 IEEE International Conference on Data Mining Workshops
, pp. 170-177
-
-
Neumeyer, L.1
Robbins, B.2
Nair, A.3
Kesari, A.4
-
27
-
-
50049089599
-
Enabling confidentiality in content-based publish/subscribe infrastructures
-
Raiciu, C., & Rosenblum, D. S. (2006). Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures (pp. 1-11). Securecomm and Workshops; doi:10.1109/SECCOMW.2006.359552
-
(2006)
Securecomm and Workshops
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
28
-
-
0017930809
-
A method for obtaining digital signatures and publickey cryptosystems
-
Retrieved from February
-
Rivest, R., Shamir, A., & Adleman, L. (1978, February). A Method for Obtaining Digital Signatures and Publickey Cryptosystems. Comm. ACM, 21 (2), 120-126. Retrieved from http://doi.acm.org/10.1145/359340.359342
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
29
-
-
78650911380
-
-
Internet Engineering Task Force
-
Shelby, Z., Hartke, K., Bormann, C., & Frank, B. (2014). RFC 7252: The Constrained Application Protocol (CoAP). Internet Engineering Task Force.
-
(2014)
RFC 7252: The Constrained Application Protocol (CoAP)
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
Frank, B.4
-
31
-
-
84929315070
-
Security issues and requirements for Internet-scale publishsubscribe systems
-
7-10 Jan
-
Wang, C., Carzaniga, A., Evans, D., & Wolf, A. L. Security issues and requirements for Internet-scale publishsubscribe systems. In 2002 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (pp. 3940-3947). 7-10 Jan. 2002. Doi:10.1109/HICSS.2002.994531
-
(2002)
2002 Proceedings of the 35th Annual Hawaii International Conference on System Sciences
, pp. 3940-3947
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.L.4
|