-
1
-
-
85019262177
-
Challenges of connecting edge and cloud computing: A security and forensic perspective
-
Esposito, Christian, Castiglione, Aniello, Pop, Florin, Choo, Kim-Kwang Raymond, Challenges of connecting edge and cloud computing: A security and forensic perspective. IEEE Cloud Comput. 4:2 (2017), 13–17.
-
(2017)
IEEE Cloud Comput.
, vol.4
, Issue.2
, pp. 13-17
-
-
Esposito, C.1
Castiglione, A.2
Pop, F.3
Choo, K.-K.R.4
-
2
-
-
85026636505
-
From cloud to fog computing: A review and a conceptual live VM migration framework
-
Osanaiye, Opeyemi A., Chen, Shuo, Yan, Zheng, Lu, Rongxing, Choo, Kim-Kwang Raymond, Dlodlo, Mqhele E., From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access 5 (2017), 8284–8300.
-
(2017)
IEEE Access
, vol.5
, pp. 8284-8300
-
-
Osanaiye, O.A.1
Chen, S.2
Yan, Z.3
Lu, R.4
Choo, K.-K.R.5
Dlodlo, M.E.6
-
3
-
-
85017346299
-
Cloud of things in smart agriculture: Intelligent irrigation monitoring by thermal imaging
-
Roopaei, Mehdi, Rad, Paul, Choo, Kim-Kwang Raymond, Cloud of things in smart agriculture: Intelligent irrigation monitoring by thermal imaging. IEEE Cloud Comput. 4:1 (2017), 10–15.
-
(2017)
IEEE Cloud Comput.
, vol.4
, Issue.1
, pp. 10-15
-
-
Roopaei, M.1
Rad, P.2
Choo, K.-K.R.3
-
4
-
-
85010075862
-
Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption
-
Deng, Ruilong, Lu, Rongxing, Lai, Chengzhe, Luan, Tom H., Liang, Hao, Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet of Things J. 3:6 (2016), 1171–1181.
-
(2016)
IEEE Internet of Things J.
, vol.3
, Issue.6
, pp. 1171-1181
-
-
Deng, R.1
Lu, R.2
Lai, C.3
Luan, T.H.4
Liang, H.5
-
5
-
-
85015097035
-
A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification
-
Alam, Quratulain, Malik, Saif Ur Rehman, Akhunzada, Adnan, Choo, Kim-Kwang Raymond, Tabbasum, Saher, Alam, Masoom, A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification. IEEE Trans. Inf. Forensics Secur. 12:6 (2017), 1259–1268.
-
(2017)
IEEE Trans. Inf. Forensics Secur.
, vol.12
, Issue.6
, pp. 1259-1268
-
-
Alam, Q.1
Malik, S.U.R.2
Akhunzada, A.3
Choo, K.-K.R.4
Tabbasum, S.5
Alam, M.6
-
6
-
-
84863151459
-
End-to-end policy-based encryption and management of data in the cloud
-
Pearson, Siani, Mont, Marco Casassa, Chen, Liqun, Reed, Archie, End-to-end policy-based encryption and management of data in the cloud. CloudCom, 2011, 764–771.
-
(2011)
CloudCom
, pp. 764-771
-
-
Pearson, S.1
Mont, M.C.2
Chen, L.3
Reed, A.4
-
7
-
-
84956692534
-
Protecting outsourced data in cloud computing through access management
-
Wang, Hua, Yi, Xun, Bertino, Elisa, Sun, Lili, Protecting outsourced data in cloud computing through access management. Concurrency, Pract. Exp. 28:3 (2016), 600–615.
-
(2016)
Concurrency, Pract. Exp.
, vol.28
, Issue.3
, pp. 600-615
-
-
Wang, H.1
Yi, X.2
Bertino, E.3
Sun, L.4
-
8
-
-
85008245198
-
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
-
Roman, Rodrigo, Lopez, Javier, Mambo, Masahiro, Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78 (2018), 680–698, 10.1016/j.future.2016.11.009.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 680-698
-
-
Roman, R.1
Lopez, J.2
Mambo, M.3
-
9
-
-
84894278511
-
End-to-end policy based encryption techniques for multi-party data management
-
Beiter, Michael, Mont, Marco Casassa, Chen, Liqun, Pearson, Siani, End-to-end policy based encryption techniques for multi-party data management. Comput. Stand. Interfaces 36:4 (2014), 689–703.
-
(2014)
Comput. Stand. Interfaces
, vol.36
, Issue.4
, pp. 689-703
-
-
Beiter, M.1
Mont, M.C.2
Chen, L.3
Pearson, S.4
-
10
-
-
84970006994
-
Privacy protection for wireless medical sensor data
-
Yi, Xun, Bouguettaya, Athman, Georgakopoulos, Dimitrios, Song, Andy, Willemson, Jan, Privacy protection for wireless medical sensor data. IEEE Trans. Dependable Secure Comput. 13:3 (2016), 369–380.
-
(2016)
IEEE Trans. Dependable Secure Comput.
, vol.13
, Issue.3
, pp. 369-380
-
-
Yi, X.1
Bouguettaya, A.2
Georgakopoulos, D.3
Song, A.4
Willemson, J.5
-
11
-
-
84904595350
-
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
-
Choo, Kim-Kwang Raymond, Nam, Junghyun, Won, Dongho, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281 (2014), 182–200.
-
(2014)
Inf. Sci.
, vol.281
, pp. 182-200
-
-
Choo, K.-K.R.1
Nam, J.2
Won, D.3
-
12
-
-
85009274837
-
An efficient access control scheme with outsourcing capability and attribute update for fog computing
-
Zhang, Peng, Chen, Zehong, Liu, Joseph K., Liang, Kaitai, Liu, Hongwei, An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 78 (2018), 753–762, 10.1016/j.future.2016.12.015.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 753-762
-
-
Zhang, P.1
Chen, Z.2
Liu, J.K.3
Liang, K.4
Liu, H.5
-
13
-
-
85016477377
-
A variant of password authenticated key exchange protocol
-
Zhang, Yuexin, Xiang, Yang, Wu, Wei, Alelaiwi, Abdulhameed, A variant of password authenticated key exchange protocol. Future Gener. Comput. Syst. 78 (2018), 699–711, 10.1016/j.future.2017.02.016.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 699-711
-
-
Zhang, Y.1
Xiang, Y.2
Wu, W.3
Alelaiwi, A.4
-
14
-
-
85014042880
-
Anonymous and secure aggregation scheme in fog-based public cloud computing
-
Wang, Huaqun, Wang, Zhiwei, Domingo-Ferrer, Josep, Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener. Comput. Syst. 78 (2018), 712–719, 10.1016/j.future.2017.02.032.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 712-719
-
-
Wang, H.1
Wang, Z.2
Domingo-Ferrer, J.3
-
15
-
-
85011878988
-
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
-
Jiang, Yinhao, Susilo, Willy, Mu, Yi, Guo, Fuchun, Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78 (2018), 720–729, 10.1016/j.future.2017.01.026.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 720-729
-
-
Jiang, Y.1
Susilo, W.2
Mu, Y.3
Guo, F.4
-
16
-
-
85029576091
-
CCA-secure ABE with outsourced decryption for fog computing
-
Zuo, Cong, Shao, Jun, Wei, Guiyi, Xie, Mande, Ji, Min, CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78 (2018), 730–738, 10.1016/j.future.2016.10.028.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 730-738
-
-
Zuo, C.1
Shao, J.2
Wei, G.3
Xie, M.4
Ji, M.5
-
17
-
-
85021436057
-
Position based cryptography with location privacy: A step for Fog Computing
-
Yang, Rupeng, Xu, Qiuliang, Au, Man Ho, Yu, Zuoxia, Wang, Hao, Zhou, Lu, Position based cryptography with location privacy: A step for Fog Computing. Future Gener. Comput. Syst. 78 (2018), 799–806, 10.1016/j.future.2017.05.035.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 799-806
-
-
Yang, R.1
Xu, Q.2
Au, M.H.3
Yu, Z.4
Wang, H.5
Zhou, L.6
-
18
-
-
85029577650
-
Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud
-
Yang, Xue, Lu, Rongxing, Choo, Kim Kwang Raymond, Yin, Fan, Tang, Xiaohu, Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Trans. Big Data, 2017, 10.1109/TBDATA.2017.2721444.
-
(2017)
IEEE Trans. Big Data
-
-
Yang, X.1
Lu, R.2
Choo, K.K.R.3
Yin, F.4
Tang, X.5
-
19
-
-
85011277966
-
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
-
Koo, Dongyoung, Hur, Junbeom, Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener. Comput. Syst. 78 (2018), 739–752, 10.1016/j.future.2017.01.024.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 739-752
-
-
Koo, D.1
Hur, J.2
-
20
-
-
85011802339
-
Towards leakage-resilient fine-grained access control in fog computing
-
Yu, Zuoxia, Au, Man Ho, Xu, Qiuliang, Yang, Rupeng, Han, Jinguang, Towards leakage-resilient fine-grained access control in fog computing. Future Gener. Comput. Syst. 78 (2018), 763–777, 10.1016/j.future.2017.01.025.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 763-777
-
-
Yu, Z.1
Au, M.H.2
Xu, Q.3
Yang, R.4
Han, J.5
-
21
-
-
85013421978
-
Secure intelligent traffic light control using fog computing
-
Liu, Jian, Li, Jiangtao, Zhang, Lei, Dai, Feifei, Zhang, Yuanfei, Meng, Xinyu, Shen, Jian, Secure intelligent traffic light control using fog computing. Future Gener. Comput. Syst. 78 (2018), 817–824, 10.1016/j.future.2017.02.017.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 817-824
-
-
Liu, J.1
Li, J.2
Zhang, L.3
Dai, F.4
Zhang, Y.5
Meng, X.6
Shen, J.7
-
22
-
-
85016064811
-
Hybrid privacy-preserving clinical decision support system in fog–cloud computing
-
Liu, Ximeng, Deng, Robert H., Yang, Yang, Tran, Hieu N., Zhong, Shangping, Hybrid privacy-preserving clinical decision support system in fog–cloud computing. Future Gener. Comput. Syst. 78 (2018), 825–837, 10.1016/j.future.2017.03.018.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 825-837
-
-
Liu, X.1
Deng, R.H.2
Yang, Y.3
Tran, H.N.4
Zhong, S.5
-
23
-
-
85015916813
-
Verifiable searchable encryption with aggregate keys for data sharing system
-
Liu, Zheli, Li, Tong, Li, Ping, Jia, Chunfu, Li, Jin, Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 78 (2018), 778–788, 10.1016/j.future.2017.0.2024.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 778-788
-
-
Liu, Z.1
Li, T.2
Li, P.3
Jia, C.4
Li, J.5
-
24
-
-
85034216876
-
Fuzzy identity-based data integrity auditing for reliable cloud storage systems
-
Li, Yannan, Yu, Yong, Min, Geyong, Susilo, Willy, Ni, Jianbing, Choo, Kim-Kwang Raymond, Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput., 2017, 10.1109/TDSC.2017.2662216.
-
(2017)
IEEE Trans. Dependable Secure Comput.
-
-
Li, Y.1
Yu, Y.2
Min, G.3
Susilo, W.4
Ni, J.5
Choo, K.-K.R.6
-
25
-
-
84992083560
-
Privacy preserving cloud data auditing with efficient key update
-
Li, Yannan, Yu, Yong, Yang, Bo, Min, Geyong, Wu, Huai, Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78 (2018), 789–798, 10.1016/j.future.2016.09.003.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 789-798
-
-
Li, Y.1
Yu, Y.2
Yang, B.3
Min, G.4
Wu, H.5
-
26
-
-
85010543298
-
Controlling and filtering users data in intelligent transportation system
-
Gosman, Catalin, Cornea, Tudor, Dobre, Ciprian, Pop, Florin, Castiglione, Aniello, Controlling and filtering users data in intelligent transportation system. Future Gener. Comput. Syst. 78 (2018), 807–816, 10.1016/j.future.2016.12.014.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 807-816
-
-
Gosman, C.1
Cornea, T.2
Dobre, C.3
Pop, F.4
Castiglione, A.5
-
27
-
-
85017399480
-
Universal and secure object ownership transfer protocol for the internet of things
-
Ray, Biplob R., Abawajy, Jemal, Chowdhury, Morshed, Alelaiwi, Abdulhameed, Universal and secure object ownership transfer protocol for the internet of things. Future Gener. Comput. Syst. 78 (2018), 838–849, 10.1016/j.future.2017.02.020.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 838-849
-
-
Ray, B.R.1
Abawajy, J.2
Chowdhury, M.3
Alelaiwi, A.4
-
28
-
-
85008226728
-
Bitcoin-based fair payments for outsourcing computations of fog devices
-
Huang, Hui, Chen, Xiaofeng, Wu, Qianhong, Huang, Xinyi, Shen, Jian, Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78 (2018), 850–858, 10.1016/j.future.2016.12.016.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 850-858
-
-
Huang, H.1
Chen, X.2
Wu, Q.3
Huang, X.4
Shen, J.5
-
29
-
-
84973885505
-
Secure data analytics for cloud-integrated internet of things applications
-
Kumarage, Heshan, Khalil, Ibrahim, Alabdulatif, Abdulatif, Tari, Zahir, Yi, Xun, Secure data analytics for cloud-integrated internet of things applications. IEEE Cloud Computing 3:2 (2016), 46–56.
-
(2016)
IEEE Cloud Computing
, vol.3
, Issue.2
, pp. 46-56
-
-
Kumarage, H.1
Khalil, I.2
Alabdulatif, A.3
Tari, Z.4
Yi, X.5
-
30
-
-
85018495637
-
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
-
Lu, Rongxing, Heung, Kevin, Lashkari, Arash Habibi, Ghorbani, Ali A., A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5 (2017), 3302–3312.
-
(2017)
IEEE Access
, vol.5
, pp. 3302-3312
-
-
Lu, R.1
Heung, K.2
Lashkari, A.H.3
Ghorbani, A.A.4
-
31
-
-
85006981923
-
Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities
-
Chen, Bo-Wei, Rho, Seungmin, Yang, Laurence T., Gu, Yu, Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities. Future Gener. Comput. Syst. 78 (2018), 859–866, 10.1016/j.future.2016.11.008.
-
(2018)
Future Gener. Comput. Syst.
, vol.78
, pp. 859-866
-
-
Chen, B.-W.1
Rho, S.2
Yang, L.T.3
Gu, Y.4
-
32
-
-
85008193408
-
Internet of Things (IoT): Smart and secure service delivery
-
22:1–22:7
-
Bertino, Elisa, Choo, Kim-Kwang Raymond, Georgakopoulos, Dimitrios, Nepal, Surya, Internet of Things (IoT): Smart and secure service delivery. ACM Trans. Internet Technol., 16(4), 2016 22:1–22:7.
-
(2016)
ACM Trans. Internet Technol.
, vol.16
, Issue.4
-
-
Bertino, E.1
Choo, K.-K.R.2
Georgakopoulos, D.3
Nepal, S.4
-
33
-
-
85029348815
-
-
George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo, Medical cyber-physical systems development: A forensics-driven approach, in: Proceedings of IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE, Philadelphia, Pennsylvania, USA, 17–19 July 2017, pp. 108–114.
-
George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo, Medical cyber-physical systems development: A forensics-driven approach, in: Proceedings of IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE, Philadelphia, Pennsylvania, USA, 17–19 July 2017, pp. 108–114.
-
-
-
-
34
-
-
84963728330
-
Forensic-by-design framework for cyber-physical cloud systems
-
Rahman, Nurul Hidayah Ab, Glisson, William Bradley, Yang, Yanjiang, Choo, Kim-Kwang Raymond, Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3:1 (2016), 50–59.
-
(2016)
IEEE Cloud Comput.
, vol.3
, Issue.1
, pp. 50-59
-
-
Rahman, N.H.A.1
Glisson, W.B.2
Yang, Y.3
Choo, K.-K.R.4
-
35
-
-
84971492452
-
Cloud incident handling and forensic-by-design: cloud storage as a case study
-
Rahman, Nurul Hidayah Ab, Cahyani, Niken Dwi Wahyu, Choo, Kim-Kwang Raymond, Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurrency, Comput.: Pract. Exp., 29(14), 2017.
-
(2017)
Concurrency, Comput.: Pract. Exp.
, vol.29
, Issue.14
-
-
Rahman, N.H.A.1
Cahyani, N.D.W.2
Choo, K.-K.R.3
|