메뉴 건너뛰기




Volumn 72, Issue 10, 2016, Pages 3677-3695

Health Fog: a novel framework for health and wellness applications

Author keywords

Big data; Cloud access security broker; Cloud storage; E health and wellness applications; Fog computing; IoT

Indexed keywords

DATA PRIVACY; DIGITAL STORAGE; FOG; HEALTH;

EID: 84955563270     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-016-1634-x     Document Type: Article
Times cited : (192)

References (30)
  • 5
    • 85015043454 scopus 로고    scopus 로고
    • Fitocracy
    • Fitocracy (2015) Fitocracy. https://www.fitocracy.com/
    • (2015) Fitocracy
  • 7
    • 84991232220 scopus 로고    scopus 로고
    • MIOLink
    • MIOLink (2015) Mio train with heart. http://www.mioglobal.com
    • (2015) Mio train with heart
  • 8
    • 84866627419 scopus 로고    scopus 로고
    • Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM
    • Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM, pp 13–16
    • (2012) Pp 13–16
    • Bonomi, F.1    Milito, R.2    Zhu, J.3    Addepalli, S.4
  • 11
    • 84937542853 scopus 로고    scopus 로고
    • A cost-effective pay-per-multiplication comparison method for millionaires. In: Topics in Cryptology CT-RSA 2001, Springer
    • Fischlin M (2001) A cost-effective pay-per-multiplication comparison method for millionaires. In: Topics in Cryptology CT-RSA 2001, Springer. pp 457–471
    • (2001) Pp 457–471
    • Fischlin, M.1
  • 12
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney Latanya (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl Based Syst 10(05):571–588
    • (2002) Int J Uncertain Fuzziness Knowl Based Syst , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 13
    • 0036811662 scopus 로고    scopus 로고
    • k-anonymity: a model for protecting privacy
    • Sweeney Latanya (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557–570
    • (2002) Int J Uncertain Fuzziness Knowl Based Syst , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 14
    • 38049029760 scopus 로고    scopus 로고
    • Encryption techniques for secure database outsourcing. In: Computer Security–ESORICS 2007, Springer
    • Evdokimov S, Günther O (2007) Encryption techniques for secure database outsourcing. In: Computer Security–ESORICS 2007, Springer, pp 327–342
    • (2007) Pp 327–342
    • Evdokimov, S.1    Günther, O.2
  • 15
    • 70349303408 scopus 로고    scopus 로고
    • A data outsourcing architecture combining cryptography and access control
    • ACM workshop on Computer security architecture, ACM
    • De Capitani S, Di Vimercati FS, Jajodia S, Paraboschi S, Samarati P (2007) A data outsourcing architecture combining cryptography and access control. In: Proceedings of the 2007 ACM workshop on Computer security architecture, ACM, pp 63–69
    • (2007) Proceedings of the , vol.2007 , pp. 63-69
    • De Capitani, S.1    Di Vimercati, F.S.2    Jajodia, S.3    Paraboschi, S.4    Samarati, P.5
  • 16
    • 84868321103 scopus 로고    scopus 로고
    • Curino C, Jones EPC, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N
    • Curino C, Jones EPC, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N (2011) Relational cloud: a database-as-a-service for the cloud
    • (2011) Relational cloud: a database-as-a-service for the cloud
  • 17
    • 77957936026 scopus 로고    scopus 로고
    • Google
    • Google (2013) Google app engine. https://cloud.google.com/products/app-engine
    • (2013) Google app engine
  • 20
    • 84864275237 scopus 로고    scopus 로고
    • Fog computing: mitigating insider data theft attacks in the cloud
    • IEEE Symposium on Security and Privacy Workshops (SPW), IEEE
    • Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW), IEEE, pp 125–128
    • (2012) In , vol.2012 , pp. 125-128
    • Stolfo, S.J.1    Salem, M.B.2    Keromytis, A.D.3
  • 21
    • 84983103058 scopus 로고    scopus 로고
    • Key ingredients in an iot recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
    • Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an iot recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp 325–329
    • (2014) Pp 325–329
    • Yannuzzi, M.1    Milito, R.2    Serral-Gracia, R.3    Montero, D.4    Nemirovsky, M.5
  • 22
    • 84937439454 scopus 로고    scopus 로고
    • Trapdooring discrete logarithms on elliptic curves over rings
    • Springer, Berlin, Heidelberg
    • Paillier P (2000) Trapdooring discrete logarithms on elliptic curves over rings. In: Okamoto T (ed) Advances in CryptologyASI—ACRYPT 2000. Springer, Berlin, Heidelberg, pp 573–584
    • (2000) Advances in CryptologyASI—ACRYPT , vol.2000 , pp. 573-584
    • Paillier, P.1    Okamoto, T.2
  • 24
    • 77952193706 scopus 로고    scopus 로고
    • A cloud computing solution for patient’s data collection in health care institutions. In: Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED’10, IEEE, pp
    • Rolim CO, Koch FL, Westphall CB, Werner J, Fracalossi A, Salvador GS (2010) A cloud computing solution for patient’s data collection in health care institutions. In: Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED’10, IEEE, pp. 95–99
    • (2010)
    • Rolim, C.O.1    Koch, F.L.2    Westphall, C.B.3    Werner, J.4    Fracalossi, A.5    Salvador, G.S.6
  • 26
    • 84938677693 scopus 로고    scopus 로고
    • Mobile gateway for ubiquitous health care system using zigbee and bluetooth. In: 014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2. IEEE
    • Laine TH, Lee C, Suk H (2014) Mobile gateway for ubiquitous health care system using zigbee and bluetooth. In: 014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2. IEEE, pp 139–145
    • (2014) Pp 139–145
    • Laine, T.H.1    Lee, C.2    Suk, H.3
  • 27
    • 79958071660 scopus 로고    scopus 로고
    • Personal gateway in mobile health monitoring. In: 011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2. IEEE
    • Yang S, Gerla M (2011) Personal gateway in mobile health monitoring. In: 011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2. IEEE, pp 636–641
    • (2011) Pp 636–641
    • Yang, S.1    Gerla, M.2
  • 28
    • 84883732282 scopus 로고    scopus 로고
    • Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing. ACM
    • Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing. ACM, pp 15–20
    • (2013) Pp 15–20
    • Hong, K.1    Lillethun, D.2    Ramachandran, U.3    Ottenwälder, B.4    Koldehofe, B.5
  • 30
    • 84921681652 scopus 로고    scopus 로고
    • Lee S (2014) Adaptive user interface and user experience based authoring tool for recommendation systems
    • Personalisation and User Adapted Services, Springer
    • Hussain J, Khan WA, Afzal M, Hussain M, Kang BH, Lee S (2014) Adaptive user interface and user experience based authoring tool for recommendation systems. In: Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. Springer, pp 136–142
    • Ubiquitous Computing and Ambient Intelligence , pp. 136-142
    • Hussain, J.1    Khan, W.A.2    Afzal, M.3    Hussain, M.4    Kang, B.H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.