메뉴 건너뛰기




Volumn 21, Issue 2, 2017, Pages 34-42

Fog Computing for the Internet of Things: Security and Privacy Issues

Author keywords

certificate revocation; fog computing; Internet of Things; Internet Web technologies; IoT; privacy; security

Indexed keywords

DATA PRIVACY; DIGITAL STORAGE; FOG;

EID: 85015190263     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2017.37     Document Type: Article
Times cited : (563)

References (17)
  • 1
    • 85017650857 scopus 로고    scopus 로고
    • Forget 'the Cloud'; 'The Fog' is Tech's Future
    • 18 May
    • C. Mims, "Forget 'the Cloud'; 'The Fog' Is Tech's Future," The Wall Street J., 18 May 2014; www.wsj.com/articles/ SB10001424052702304908304579566662320279406
    • (2014) The Wall Street J
    • Mims, C.1
  • 4
    • 84963780985 scopus 로고    scopus 로고
    • Energy Management- as-A-Service over Fog Computing Platform
    • M. Al Faruque K. Vatanparvar, "Energy Management- as-A-Service Over Fog Computing Platform," IEEE Internet of Things J., vol. 3, no. 2, 2012, pp. 161-169
    • (2012) IEEE Internet of Things J , vol.3 , Issue.2 , pp. 161-169
    • Al Faruque, M.1    Vatanparvar, K.2
  • 5
    • 84872126433 scopus 로고    scopus 로고
    • Wake: Key management scheme for wide-area measurement systems in smart grid
    • Y.W. Law et al., "Wake: Key Management Scheme for Wide-Area Measurement Systems in Smart Grid," IEEE Communications Mag., vol. 51, no. 1, 2014, pp. 34-41
    • (2014) IEEE Communications Mag , vol.51 , Issue.1 , pp. 34-41
    • Law, Y.W.1
  • 7
    • 51349162676 scopus 로고    scopus 로고
    • A hybrid rogue access point protection framework for commodity wi-fi networks
    • L. Ma, A.Y. Teymorian X. Cheng, "A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks," Proc. 27th IEEE Conf. Computer Comm., 2008; doi:10.1109/infocom.2008.178
    • (2008) Proc. 27th IEEE Conf. Computer Comm
    • Ma, L.1    Teymorian, A.Y.2    Cheng, X.3
  • 8
    • 84861597427 scopus 로고    scopus 로고
    • MobiShare: Flexible privacy- preserving location sharing in mobile online social networks
    • W. Wei, F. Xu Q. Li, "MobiShare: Flexible Privacy- Preserving Location Sharing in Mobile Online Social Networks," Proc. IEEE Conf. Computer Comm., 2012, pp. 2616-2620
    • (2012) Proc. IEEE Conf. Computer Comm , pp. 2616-2620
    • Wei, W.1    Xu, F.2    Li, Q.3
  • 9
    • 84859045535 scopus 로고    scopus 로고
    • On the release of crls in public key infrastructure
    • article no. 2
    • C. Ma, N. Hu Y. Li, "On the Release of CRLs in Public Key Infrastructure," Proc. 15th Usenix Security Symp., vol. 15, 2006, article no. 2
    • (2006) Proc. 15th Usenix Security Symp , vol.15
    • Ma, C.1    Hu, N.2    Li, Y.3
  • 10
    • 84893081685 scopus 로고    scopus 로고
    • The case for prefetching prevalidating TLS server certificates
    • E. Stark et al., "The Case for Prefetching Prevalidating TLS Server Certificates," Proc. 19th Ann. Network &Distributed System Security Symp., 2012; www. internetsociety.org/sites/default/files/12-4.pdf
    • (2012) Proc. 19th Ann. Network &Distributed System Security Symp
    • Stark, E.1
  • 15
    • 84942369666 scopus 로고    scopus 로고
    • A novel verification method for payment card systems
    • A. Alhothaily, A. Alrawais X. Cheng, "A Novel Verification Method for Payment Card Systems," J. Personal Ubiquitous Computing, vol. 19, no. 7, 2015, pp. 1145-1156
    • (2015) J. Personal Ubiquitous Computing , vol.19 , Issue.7 , pp. 1145-1156
    • Alhothaily, A.1    Alrawais, A.2    Cheng, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.