메뉴 건너뛰기




Volumn , Issue , 2017, Pages 311-315

Fog computing: Common security issues and proposed countermeasures

Author keywords

Cloud Computing; Decoy Technique; Fog Computing; Privacy; Security

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; DIGITAL STORAGE; FOG;

EID: 85018284804     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SYSMART.2016.7894541     Document Type: Conference Paper
Times cited : (47)

References (12)
  • 2
    • 84912130127 scopus 로고    scopus 로고
    • The fog computing paradigm:Scenarios and security issues
    • IEEE
    • Stojmenovic, I., Wen, S.,"The fog computing paradigm:Scenarios and security issues."In: FedCSIS. IEEE (2014)
    • (2014) FedCSIS
    • Stojmenovic, I.1    Wen, S.2
  • 9
    • 85018325621 scopus 로고    scopus 로고
    • Cloud Computing and Security issues in the cloud
    • Monjour Ahmed, Mohammad Ashraf Hossain," Cloud Computing and Security issues in the cloud" IJNSA
    • IJNSA
    • Ahmed, M.1    Hossain, M.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.