-
1
-
-
85015176969
-
Challenges and software architecture for fog computing
-
Hao Z, Novak E, Yi S, Li Q. Challenges and software architecture for fog computing. IEEE Internet Comput. 2017;21(2):44-53.
-
(2017)
IEEE Internet Comput
, vol.21
, Issue.2
, pp. 44-53
-
-
Hao, Z.1
Novak, E.2
Yi, S.3
Li, Q.4
-
2
-
-
85046096153
-
Review of implementing fog computing
-
More P. Review of implementing fog computing. Int J Res Eng Technol. 2015.
-
(2015)
Int J Res Eng Technol
-
-
More, P.1
-
3
-
-
85016275071
-
Foud: integrating fog and cloud for 5G-enabled V2G networks
-
Tao M, Ota K, Dong M. Foud: integrating fog and cloud for 5G-enabled V2G networks. IEEE Netw. 2017;31(2):8-13.
-
(2017)
IEEE Netw
, vol.31
, Issue.2
, pp. 8-13
-
-
Tao, M.1
Ota, K.2
Dong, M.3
-
4
-
-
84997402736
-
The design and architecture of microservices
-
Sill A. The design and architecture of microservices. IEEE Cloud Comput. 2016;3(5):76-80.
-
(2016)
IEEE Cloud Comput
, vol.3
, Issue.5
, pp. 76-80
-
-
Sill, A.1
-
5
-
-
84964299970
-
-
Paper presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM);, Liverpool, UK
-
Dong M, Ota K, Liu A. Preserving source-location privacy through redundant fog loop for wireless sensor networks. Paper presented at: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM); 2015; Liverpool, UK.
-
(2015)
Preserving source-location privacy through redundant fog loop for wireless sensor networks
-
-
Dong, M.1
Ota, K.2
Liu, A.3
-
7
-
-
85073668143
-
-
Rancher. RancherOS. 2017. http://rancher.com/rancher-os/
-
(2017)
Rancher. RancherOS
-
-
-
8
-
-
84969922595
-
The promise of edge computing
-
Shi W, Dustdar S. The promise of edge computing. Computer. 2016;49(5):78-81.
-
(2016)
Computer
, vol.49
, Issue.5
, pp. 78-81
-
-
Shi, W.1
Dustdar, S.2
-
9
-
-
84866627419
-
-
Paper presented at Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing,, ACM, Helsinki, Finland
-
Bonomi F, Milito R, Zhu J, Addepalli S. Fog computing and its role in the internet of things. Paper presented at: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ACM; 2012; Helsinki, Finland.
-
(2012)
Fog computing and its role in the internet of things
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
12
-
-
84997542957
-
Practical use of microservices in moving workloads to the cloud
-
Linthicum DS. Practical use of microservices in moving workloads to the cloud. IEEE Cloud Comput. 2016;3(5):6-9.
-
(2016)
IEEE Cloud Comput
, vol.3
, Issue.5
, pp. 6-9
-
-
Linthicum, D.S.1
-
13
-
-
85012229582
-
Security in the cloud
-
Anthes G. Security in the cloud. Commun ACM. 2010;53(11):16-18.
-
(2010)
Commun ACM
, vol.53
, Issue.11
, pp. 16-18
-
-
Anthes, G.1
-
14
-
-
84960453787
-
-
Paper presented at 2015 13th International Conference on Telecommunications (ConTEL);, Graz, Austria
-
Patanjali S, Truninger B, Harsh P, Bohnert TM. Cyclops: a micro service based approach for dynamic rating, charging and billing for cloud. Paper presented at: 2015 13th International Conference on Telecommunications (ConTEL); 2015; Graz, Austria.
-
(2015)
Cyclops: a micro service based approach for dynamic rating, charging and billing for cloud
-
-
Patanjali, S.1
Truninger, B.2
Harsh, P.3
Bohnert, T.M.4
-
17
-
-
85072639060
-
Setting up Jenkins on Docker and Cloud
-
Berkeley, CA, Apress
-
Pathania N. Setting up Jenkins on Docker and Cloud. Pro Continuous Delivery. Berkeley, CA: Apress; 2017:115-143.
-
(2017)
Pro Continuous Delivery
, pp. 115-143
-
-
Pathania, N.1
-
18
-
-
84988893733
-
Approaches to the evolution of SOA systems
-
Wilde N, Gonen B, El-Sheikh E, Zimmermann A, eds., Cham, Switzerland, Springer International Publishing
-
Wilde N, Gonen B, El-Sheikh E, Zimmermann A. Approaches to the evolution of SOA systems. In: Wilde N, Gonen B, El-Sheikh E, Zimmermann A, eds. Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures. Cham, Switzerland: Springer International Publishing; 2016;11:5-21.
-
(2016)
Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures
, vol.11
, pp. 5-21
-
-
Wilde, N.1
Gonen, B.2
El-Sheikh, E.3
Zimmermann, A.4
-
19
-
-
85073663489
-
-
Paper presented at 2007 Free and Open Source Software Conference;, Skopje, Macedonia
-
Chappell D. Enterprise Service Bus. Paper presented at: 2007 Free and Open Source Software Conference; 2007; Skopje, Macedonia.
-
(2007)
Enterprise Service Bus
-
-
Chappell, D.1
-
20
-
-
84997523709
-
The Economics of microservices
-
Singleton A. The Economics of microservices. IEEE Cloud Comput. 2016;3(5):16-20.
-
(2016)
IEEE Cloud Comput
, vol.3
, Issue.5
, pp. 16-20
-
-
Singleton, A.1
-
22
-
-
84946103342
-
-
Paper presented at 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO);, Opatija, Croatia
-
Savchenko DI, Radchenko GI, Taipale O. Microservices validation: Mjolnirr platform case study. Paper presented at: 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO); 2015; Opatija, Croatia.
-
(2015)
Microservices validation: Mjolnirr platform case study
-
-
Savchenko, D.I.1
Radchenko, G.I.2
Taipale, O.3
-
24
-
-
84983458085
-
-
Paper presented at 2016 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid);, Cartagena, Colombia
-
Villamizar M, Zambrano A, Lang M, et al. Infrastructure cost comparison of running web applications in the cloud using AWS lambda and monolithic and microservice architectures. Paper presented at: 2016 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid); 2016; Cartagena, Colombia.
-
(2016)
Infrastructure cost comparison of running web applications in the cloud using AWS lambda and monolithic and microservice architectures
-
-
Villamizar, M.1
Zambrano, A.2
Lang, M.3
-
25
-
-
85015161312
-
An open IoT framework based on microservices architecture
-
Sun L, Li Y, Memon RA. An open IoT framework based on microservices architecture. China Commun. 2017;14(2):154-162.
-
(2017)
China Commun
, vol.14
, Issue.2
, pp. 154-162
-
-
Sun, L.1
Li, Y.2
Memon, R.A.3
-
27
-
-
85010375308
-
-
Paper presented at Proceedings of the 1st International Workshop on Mashups of Things and APIs;, Trento, Italy
-
Bao K, Mauser I, Kochanneck S, Xu H, Schmeck H. A microservice architecture for the intranet of things and energy in smart buildings. Paper presented at: Proceedings of the 1st International Workshop on Mashups of Things and APIs; 2016; Trento, Italy.
-
(2016)
A microservice architecture for the intranet of things and energy in smart buildings
-
-
Bao, K.1
Mauser, I.2
Kochanneck, S.3
Xu, H.4
Schmeck, H.5
-
28
-
-
85015190263
-
Fog computing for the internet of things: security and privacy issues
-
Alrawais A, Alhothaily A, Hu C, Cheng X. Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 2017;21(2): 34-42.
-
(2017)
IEEE Internet Comput
, vol.21
, Issue.2
, pp. 34-42
-
-
Alrawais, A.1
Alhothaily, A.2
Hu, C.3
Cheng, X.4
-
29
-
-
84990859056
-
-
Paper presented at BIR Workshops;, Prague, Czech Republic
-
Zimmermann A, Bogner J, Schmidt R, Jugel D, Schweda C, Möhring M. Digital enterprise architecture with micro-granular systems and services. Paper presented at: BIR Workshops; 2016; Prague, Czech Republic.
-
(2016)
Digital enterprise architecture with micro-granular systems and services
-
-
Zimmermann, A.1
Bogner, J.2
Schmidt, R.3
Jugel, D.4
Schweda, C.5
Möhring, M.6
-
30
-
-
84954159829
-
-
Paper presented at 2015 IEEE International Conference on Mobile Services;, New York, NY
-
Bak P, Melamed R, Moshkovich D, Nardi Y, Ship H, Yaeli A. Location and context-based microservices for mobile and internet of things workloads. Paper presented at: 2015 IEEE International Conference on Mobile Services; 2015; New York, NY.
-
(2015)
Location and context-based microservices for mobile and internet of things workloads
-
-
Bak, P.1
Melamed, R.2
Moshkovich, D.3
Nardi, Y.4
Ship, H.5
Yaeli, A.6
-
31
-
-
84981313546
-
-
Paper presented at 2016 IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI);, Timisoara, Romania
-
Gadea C, Trifan M, Ionescu D, Cordea M, Ionescu B. A microservices architecture for collaborative document editing enhanced with face recognition. Paper presented at: 2016 IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI); 2016; Timisoara, Romania.
-
(2016)
A microservices architecture for collaborative document editing enhanced with face recognition
-
-
Gadea, C.1
Trifan, M.2
Ionescu, D.3
Cordea, M.4
Ionescu, B.5
-
32
-
-
84963690007
-
Docker cluster management for the cloud-survey results and own solution
-
Peinl R, Holzschuher F, Pfitzer F. Docker cluster management for the cloud-survey results and own solution. J Grid Comput. 2016;14(2):265-282.
-
(2016)
J Grid Comput
, vol.14
, Issue.2
, pp. 265-282
-
-
Peinl, R.1
Holzschuher, F.2
Pfitzer, F.3
-
33
-
-
84979776387
-
-
Paper presented at Proceedings of the 6th International Conference on Cloud Computing and Services Science (CLOSER);, Rome, Italy
-
Pahl C, Jamshidi P. Microservices: a systematic mapping study. Paper presented at: Proceedings of the 6th International Conference on Cloud Computing and Services Science (CLOSER); 2016; Rome, Italy.
-
(2016)
Microservices: a systematic mapping study
-
-
Pahl, C.1
Jamshidi, P.2
-
34
-
-
85009186306
-
Understanding cloud-native applications after 10 years of cloud computing-a systematic mapping study
-
Kratzke N, Quint PC. Understanding cloud-native applications after 10 years of cloud computing-a systematic mapping study. J Syst Softw. 2017;126:1-16.
-
(2017)
J Syst Softw
, vol.126
, pp. 1-16
-
-
Kratzke, N.1
Quint, P.C.2
-
36
-
-
84966309390
-
-
Paper presented at 2015 IEEE Conference on Communications and Network Security (CNS);, Florence, Italy
-
Bacis E, Mutti S, Capelli S, Paraboschi S. DockerPolicyModules: mandatory access control for docker containers. Paper presented at: 2015 IEEE Conference on Communications and Network Security (CNS); 2015; Florence, Italy.
-
(2015)
DockerPolicyModules: mandatory access control for docker containers
-
-
Bacis, E.1
Mutti, S.2
Capelli, S.3
Paraboschi, S.4
-
37
-
-
85073663722
-
-
Paper presented at 2009 Proceedings of the 5th International Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT 2009);, Dublin, Ireland
-
Checconi F, Cucinotta T, Faggioli D, Lipari G. Hierarchical multiprocessor CPU reservations for the Linux kernel. Paper presented at: 2009 Proceedings of the 5th International Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT 2009); 2009; Dublin, Ireland.
-
(2009)
Hierarchical multiprocessor CPU reservations for the Linux kernel
-
-
Checconi, F.1
Cucinotta, T.2
Faggioli, D.3
Lipari, G.4
-
39
-
-
84992093386
-
-
Paper presented at 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT);, Kollam, India
-
Manu AR, Patel JK, Akhtar S, Agrawal VK, Murthy KNBS. A study, analysis and deep dive on cloud PaaS security in terms of docker container security. Paper presented at: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT); 2016; Kollam, India.
-
(2016)
A study, analysis and deep dive on cloud PaaS security in terms of docker container security
-
-
Manu, A.R.1
Patel, J.K.2
Akhtar, S.3
Agrawal, V.K.4
Murthy, K.N.B.S.5
-
43
-
-
34548029519
-
-
Paper presented at ACM SIGOPS Operating Systems Review;, New York, NY
-
Soltesz S, Pötzl S, Fiuczynski ME, Bavier A, Peterson L. Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. Paper presented at: ACM SIGOPS Operating Systems Review; 2007; New York, NY.
-
(2007)
Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
-
-
Soltesz, S.1
Pötzl, S.2
Fiuczynski, M.E.3
Bavier, A.4
Peterson, L.5
-
45
-
-
85009739595
-
-
Paper presented at Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware;, Trento, Italy
-
Truyen E, Landuyt DV, Reniers V, Rafique A, Lagaisse B, Joosen W. Towards a container-based architecture for multi-tenant SaaS applications. Paper presented at: Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware; 2016; Trento, Italy.
-
(2016)
Towards a container-based architecture for multi-tenant SaaS applications
-
-
Truyen, E.1
Landuyt, D.V.2
Reniers, V.3
Rafique, A.4
Lagaisse, B.5
Joosen, W.6
-
46
-
-
84997418705
-
To docker or not to docker: a security perspective
-
Combe T, Martin A, Di Pietro R. To docker or not to docker: a security perspective. IEEE Cloud Computing. 2016;3(5):54-62.
-
(2016)
IEEE Cloud Computing
, vol.3
, Issue.5
, pp. 54-62
-
-
Combe, T.1
Martin, A.2
Di Pietro, R.3
-
47
-
-
85019082945
-
-
Paper presented at Proceedings of the 2017 International Conference on Cryptography, Security and Privacy;, Wuhan, China
-
Jian Z, Chen L. A defense method against docker escape attack. Paper presented at: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy; 2017; Wuhan, China.
-
(2017)
A defense method against docker escape attack
-
-
Jian, Z.1
Chen, L.2
-
48
-
-
85031702692
-
-
Paper presented at 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),, IEEE, Denver, CO
-
Gao X, Gu Z, Kayaalp M, Pendarakis D, Wang H. ContainerLeaks: emerging security threats of information leakages in container clouds. Paper presented at: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE; 2016; Denver, CO.
-
(2016)
ContainerLeaks: emerging security threats of information leakages in container clouds
-
-
Gao, X.1
Gu, Z.2
Kayaalp, M.3
Pendarakis, D.4
Wang, H.5
-
49
-
-
84992129547
-
-
Paper presented at 2016 International Conference on Circuit Power and Computing Technologies (ICCPCT);, Kollam, India
-
Manu AR, Patel JK, Akhtar S, Agrawal VK, Murthy KNBS. Docker container security via heuristics-based multilateral security-conceptual and pragmatic study. Paper presented at: 2016 International Conference on Circuit Power and Computing Technologies (ICCPCT); 2016; Kollam, India.
-
(2016)
Docker container security via heuristics-based multilateral security-conceptual and pragmatic study
-
-
Manu, A.R.1
Patel, J.K.2
Akhtar, S.3
Agrawal, V.K.4
Murthy, K.N.B.S.5
-
50
-
-
77954322780
-
-
Paper presented at 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA);, Perth, Australia
-
Dillon T, Wu C, Chang E. Cloud computing: issues and challenges. Paper presented at: 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA); 2010; Perth, Australia.
-
(2010)
Cloud computing: issues and challenges
-
-
Dillon, T.1
Wu, C.2
Chang, E.3
-
51
-
-
78149234791
-
Service-oriented computing and cloud computing: challenges and opportunities
-
Wei Y, Blake MB. Service-oriented computing and cloud computing: challenges and opportunities. IEEE Internet Comput. 2011;14(6):72-75.
-
(2011)
IEEE Internet Comput
, vol.14
, Issue.6
, pp. 72-75
-
-
Wei, Y.1
Blake, M.B.2
-
54
-
-
74049103479
-
-
Paper presented at 14th ACM Conference on Computer and Communications Security;, Alexandria, VA
-
Juels A, Kaliski BS. PORs: proofs of retrievability for large files. Paper presented at: 14th ACM Conference on Computer and Communications Security; 2007; Alexandria, VA.
-
(2007)
PORs: proofs of retrievability for large files
-
-
Juels, A.1
Kaliski, B.S.2
-
55
-
-
85016272824
-
-
Paper presented at Workshop on Hot Topics in Operating Systems (HotOS'07);, San Diego, CA
-
Shah MA, Baker M, Mogul JC, Swaminathan R. Auditing to keep online storage services honest. Paper presented at: Workshop on Hot Topics in Operating Systems (HotOS'07); 2007; San Diego, CA.
-
(2007)
Auditing to keep online storage services honest
-
-
Shah, M.A.1
Baker, M.2
Mogul, J.C.3
Swaminathan, R.4
-
56
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
Wang C, Ren K, Lou W, Li J. Toward publicly auditable secure cloud data storage services. IEEE Netw. 2010;24(4).
-
(2010)
IEEE Netw
, vol.24
, Issue.4
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
57
-
-
77953295132
-
-
Paper presented at 2010 Proceedings of IEEE INFOCOM;, San Diego, CA
-
Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. Paper presented at: 2010 Proceedings of IEEE INFOCOM; 2010; San Diego, CA.
-
(2010)
Privacy-preserving public auditing for data storage security in cloud computing
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
58
-
-
84997171376
-
Challenges in delivering software in the cloud as microservices
-
Esposito C, Castiglione A, Choo KKR. Challenges in delivering software in the cloud as microservices. IEEE Cloud Comput. 2016;3(5):10-14.
-
(2016)
IEEE Cloud Comput
, vol.3
, Issue.5
, pp. 10-14
-
-
Esposito, C.1
Castiglione, A.2
Choo, K.K.R.3
-
59
-
-
85006043540
-
-
Paper presented at 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging A Better Tomorrow (RTSI);, Bologna, Italy
-
Callegati F, Giallorenzo S, Melis A, Prandini M. Data security issues in MaaS-enabling platforms. Paper presented at: 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging A Better Tomorrow (RTSI); 2016; Bologna, Italy.
-
(2016)
Data security issues in MaaS-enabling platforms
-
-
Callegati, F.1
Giallorenzo, S.2
Melis, A.3
Prandini, M.4
-
60
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl. 2011;34(1):1-11.
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
65
-
-
84906242615
-
New Algorithms for Secure Outsourcing of Modular Exponentiations
-
Chen X, Li J, Ma J, Tang Q, Lou W. New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans Parallel Distrib Syst. 2014;25(9):2386-2396.
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.9
, pp. 2386-2396
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
66
-
-
84893719831
-
Identity-based chameleon hashing and signatures without key exposure
-
Chen X, Zhang F, Susilo W, Tian H, Li J, Kim K. Identity-based chameleon hashing and signatures without key exposure. Inform Sci. 2014;265:198-210.
-
(2014)
Inform Sci
, vol.265
, pp. 198-210
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Tian, H.4
Li, J.5
Kim, K.6
-
67
-
-
84962022357
-
New publicly verifiable databases with efficient updates
-
Chen X, Li J, Huang X, Ma J, Lou W. New publicly verifiable databases with efficient updates. IEEE Trans Dependable Secure Comput. 2015;12(5):546-556.
-
(2015)
IEEE Trans Dependable Secure Comput
, vol.12
, Issue.5
, pp. 546-556
-
-
Chen, X.1
Li, J.2
Huang, X.3
Ma, J.4
Lou, W.5
-
68
-
-
84987657487
-
Verifiable computation over large database with incremental updates
-
Chen X, Li J, Weng J, Ma J, Lou W. Verifiable computation over large database with incremental updates. IEEE Trans Comput. 2016;65(10):3184-3195.
-
(2016)
IEEE Trans Comput
, vol.65
, Issue.10
, pp. 3184-3195
-
-
Chen, X.1
Li, J.2
Weng, J.3
Ma, J.4
Lou, W.5
-
69
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
Li J, Chen X, Li M, Li J, Lee PP, Lou W. Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst. 2014;25(6):1615-1625.
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.P.5
Lou, W.6
-
70
-
-
85070850121
-
Privacy-preserving outsourced classification in cloud computing
-
Li P, Li J, Huang Z, Gao CZ, Chen WB, Chen K. Privacy-preserving outsourced classification in cloud computing. Clust Comput. 2017:1-10.
-
(2017)
Clust Comput
, pp. 1-10
-
-
Li, P.1
Li, J.2
Huang, Z.3
Gao, C.Z.4
Chen, W.B.5
Chen, K.6
-
71
-
-
85028920194
-
Secure attribute-based data sharing for resource-limited users in cloud computing
-
Li J, Zhang Y, Chen X, Xiang Y. Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur. 2018;72:1-12.
-
(2018)
Comput Secur
, vol.72
, pp. 1-12
-
-
Li, J.1
Zhang, Y.2
Chen, X.3
Xiang, Y.4
-
72
-
-
85023631530
-
High performance and security in cloud computing
-
Bu K, Xiao B, Qian Y. High performance and security in cloud computing. Concurr Comput Pract Exp. 2017;29(19).
-
(2017)
Concurr Comput Pract Exp
, vol.29
, Issue.19
-
-
Bu, K.1
Xiao, B.2
Qian, Y.3
-
76
-
-
84887853842
-
-
Paper presented at 2002 Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks;, Monterey, CA
-
Pearlman L, Welch V, Foster I, Kesselman C, Tuecke S. A community authorization service for group collaboration. Paper presented at: 2002 Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks; 2002; Monterey, CA.
-
(2002)
A community authorization service for group collaboration
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
77
-
-
85069962297
-
Analysing the security of Google's implementation of OpenID connect
-
Caballero J, Zurutuza U, Rodriguez R, eds., Berlin, Germany, Springer-Verlag
-
Li W, Mitchell CJ. Analysing the security of Google's implementation of OpenID connect. In: Caballero J, Zurutuza U, Rodriguez R, eds. Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin, Germany: Springer-Verlag; 2015.
-
(2015)
Detection of Intrusions and Malware, and Vulnerability Assessment
-
-
Li, W.1
Mitchell, C.J.2
-
78
-
-
85006858111
-
-
Paper presented at 2016 17th Telecommunications Network Strategy and Planning Symposium;, Montréal, Canada
-
Thanh TQ, Covaci S, Magedanz T, Gouvas P, Zafeiropoulos A. Embedding security and privacy into the development and operation of cloud applications and services. Paper presented at: 2016 17th Telecommunications Network Strategy and Planning Symposium; 2016; Montréal, Canada.
-
(2016)
Embedding security and privacy into the development and operation of cloud applications and services
-
-
Thanh, T.Q.1
Covaci, S.2
Magedanz, T.3
Gouvas, P.4
Zafeiropoulos, A.5
-
79
-
-
84968831988
-
DevOps
-
Ebert C, Gallardo G, Hernantes J, Serrano N. DevOps. IEEE Softw. 2016;33(3):94-100.
-
(2016)
IEEE Softw
, vol.33
, Issue.3
, pp. 94-100
-
-
Ebert, C.1
Gallardo, G.2
Hernantes, J.3
Serrano, N.4
-
80
-
-
85028317284
-
Cyber security attacks to modern vehicular systems
-
Pan L, Zheng X, Chen HX, Luan T, Bootwala H, Batten L. Cyber security attacks to modern vehicular systems. J Inf Secur Appl. 2017;36:90-100.
-
(2017)
J Inf Secur Appl
, vol.36
, pp. 90-100
-
-
Pan, L.1
Zheng, X.2
Chen, H.X.3
Luan, T.4
Bootwala, H.5
Batten, L.6
-
81
-
-
84981332748
-
-
Paper presented at 2016 IEEE International Conference on Communications (ICC);, Kuala Lumpur, Malaysia
-
Liu Z, Dong M, Zhou H, Wang X, Ji Y, Tanaka Y. Device-to-device assisted video frame recovery for picocell edge users in heterogeneous networks. Paper presented at: 2016 IEEE International Conference on Communications (ICC); 2016; Kuala Lumpur, Malaysia.
-
(2016)
Device-to-device assisted video frame recovery for picocell edge users in heterogeneous networks
-
-
Liu, Z.1
Dong, M.2
Zhou, H.3
Wang, X.4
Ji, Y.5
Tanaka, Y.6
-
82
-
-
85019042766
-
A secure mechanism for big data collection in large scale internet of vehicles
-
Guo L, Dong M, Ota K, et al. A secure mechanism for big data collection in large scale internet of vehicles. IEEE Internet Things J. 2017;4(2):601-610.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.2
, pp. 601-610
-
-
Guo, L.1
Dong, M.2
Ota, K.3
-
83
-
-
84971228978
-
MEDAPs: secure multientities delegated authentication protocols for mobile cloud computing
-
Zhang L, Wei L, Huang D, Zhang K, Dong M, Ota K. MEDAPs: secure multientities delegated authentication protocols for mobile cloud computing. Secur Commun Netw. 2016;9(16):3777-3789.
-
(2016)
Secur Commun Netw
, vol.9
, Issue.16
, pp. 3777-3789
-
-
Zhang, L.1
Wei, L.2
Huang, D.3
Zhang, K.4
Dong, M.5
Ota, K.6
-
84
-
-
84979828898
-
A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
-
Wu J, Ota K, Dong M, Li C. A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access. 2016;4:416-424.
-
(2016)
IEEE Access
, vol.4
, pp. 416-424
-
-
Wu, J.1
Ota, K.2
Dong, M.3
Li, C.4
-
85
-
-
85025145595
-
New advances in future network technologies
-
Qi H, Dong M. New advances in future network technologies. Concurr Comput Pract Exp. 2017;29(16).
-
(2017)
Concurr Comput Pract Exp
, vol.29
, Issue.16
-
-
Qi, H.1
Dong, M.2
-
86
-
-
84979981955
-
Various solutions for address resolution protocol spoofing attacks
-
Venkataramulu S, Rao DCVG. Various solutions for address resolution protocol spoofing attacks. Int J Sci Res Pub. 2013;3(7):1.
-
(2013)
Int J Sci Res Pub
, vol.3
, Issue.7
, pp. 1
-
-
Venkataramulu, S.1
Rao, D.C.V.G.2
-
87
-
-
74549219772
-
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
-
Haataja K, Toivanen P. Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. IEEE Trans Wirel Commun. 2010;9(1).
-
(2010)
IEEE Trans Wirel Commun
, vol.9
, Issue.1
-
-
Haataja, K.1
Toivanen, P.2
-
88
-
-
84891816613
-
A system for denial-of-service attack detection based on multivariate correlation analysis
-
Tan Z, Jamdagni A, He X, Nanda P, Liu RP. A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans Parallel Distrib Syst. 2014;25(2):447-456.
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.2
, pp. 447-456
-
-
Tan, Z.1
Jamdagni, A.2
He, X.3
Nanda, P.4
Liu, R.P.5
-
90
-
-
48349106601
-
-
Paper presented at 2008 International Conference on Information Science and Security (ICISS);, Seoul, South Korea
-
Hwang H, Jung G, Sohn K, Park S. A study on MITM (man in the middle) vulnerability in wireless network using 802.1 X and EAP. Paper presented at: 2008 International Conference on Information Science and Security (ICISS); 2008; Seoul, South Korea.
-
(2008)
A study on MITM (man in the middle) vulnerability in wireless network using 802.1 X and EAP
-
-
Hwang, H.1
Jung, G.2
Sohn, K.3
Park, S.4
-
91
-
-
11244304396
-
-
Paper presented at Proceedings of the 3rd ACM Workshop on Wireless Security;, Philadelphia, PA
-
Meyer U, Wetzel S. A man-in-the-middle attack on UMTS. Paper presented at: Proceedings of the 3rd ACM Workshop on Wireless Security; 2004; Philadelphia, PA.
-
(2004)
A man-in-the-middle attack on UMTS
-
-
Meyer, U.1
Wetzel, S.2
-
93
-
-
76749128929
-
Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks
-
Nam SY, Kim D, Kim J. Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks. IEEE Commun Lett. 2010;14(2):187-189.
-
(2010)
IEEE Commun Lett
, vol.14
, Issue.2
, pp. 187-189
-
-
Nam, S.Y.1
Kim, D.2
Kim, J.3
-
95
-
-
77952402462
-
-
Paper presented at 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA);, Bangalore, India
-
Joshi Y, Das D, Saha S. Mitigating man in the middle attack over secure sockets layer. Paper presented at: 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA); 2009; Bangalore, India.
-
(2009)
Mitigating man in the middle attack over secure sockets layer
-
-
Joshi, Y.1
Das, D.2
Saha, S.3
-
97
-
-
85026774220
-
Mitigation of hardware trojan based denial-of-service attack for secure NoCs
-
Boraten T, Kodi A. Mitigation of hardware trojan based denial-of-service attack for secure NoCs. J Parallel Distrib Comput. 2017;111:24-38.
-
(2017)
J Parallel Distrib Comput
, vol.111
, pp. 24-38
-
-
Boraten, T.1
Kodi, A.2
-
98
-
-
85040330254
-
Feature selection of denial-of-service attacks using entropy and granular computing
-
Khan S, Gani A, Wahab AWA, Singh PK. Feature selection of denial-of-service attacks using entropy and granular computing. Arabian J Sci Eng. 2018;43:499-508.
-
(2018)
Arabian J Sci Eng
, vol.43
, pp. 499-508
-
-
Khan, S.1
Gani, A.2
Wahab, A.W.A.3
Singh, P.K.4
-
99
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: a tutorial
-
Chang RKC. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Mag. 2002;40(10):42-51.
-
(2002)
IEEE Commun Mag
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
100
-
-
1242287724
-
-
Paper presented at Proceedings of the 2003 Conference on Applications, Technologies, ArchitecturesProtocols for Computer Communications;, Karlsruhe, Germany
-
Hussain A, Heidemann J, Papadopoulos C. A framework for classifying denial of service attacks. Paper presented at: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications; 2003; Karlsruhe, Germany.
-
(2003)
A framework for classifying denial of service attacks
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
104
-
-
85062919372
-
Practical overview of security issues in wireless sensor network applications
-
Radhappa H, Pan L, Zheng JX, Wen S. Practical overview of security issues in wireless sensor network applications. Int J Comput Appl. 2017:1-12.
-
(2017)
Int J Comput Appl
, pp. 1-12
-
-
Radhappa, H.1
Pan, L.2
Zheng, J.X.3
Wen, S.4
-
105
-
-
85014119108
-
Identifying propagation sources in networks: state-of-the-art and comparative studies
-
Jiang J, Wen S, Yu S, Xiang Y, Zhou W. Identifying propagation sources in networks: state-of-the-art and comparative studies. IEEE Commun Surv Tutorials. 2017;19(1):465-481.
-
(2017)
IEEE Commun Surv Tutorials
, vol.19
, Issue.1
, pp. 465-481
-
-
Jiang, J.1
Wen, S.2
Yu, S.3
Xiang, Y.4
Zhou, W.5
-
106
-
-
84901195399
-
Modeling the propagation of worms in networks: a survey
-
Wang Y, Wen S, Xiang Y, Zhou W. Modeling the propagation of worms in networks: a survey. IEEE Commun Surv Tutorials. 2014;16(2):942-960.
-
(2014)
IEEE Commun Surv Tutorials
, vol.16
, Issue.2
, pp. 942-960
-
-
Wang, Y.1
Wen, S.2
Xiang, Y.3
Zhou, W.4
-
107
-
-
84928596525
-
An overview of fog computing and its security issues
-
Stojmenovic I, Wen S, Huang X, Luan H. An overview of fog computing and its security issues. Concurr Comput Pract Exp. 2016;28(10):2991-3005.
-
(2016)
Concurr Comput Pract Exp
, vol.28
, Issue.10
, pp. 2991-3005
-
-
Stojmenovic, I.1
Wen, S.2
Huang, X.3
Luan, H.4
-
108
-
-
84923197121
-
Sword with two edges: propagation studies on both positive and negative information in online social networks
-
Wen S, Haghighi MS, Chen C, Xiang Y, Zhou W, Jia W. Sword with two edges: propagation studies on both positive and negative information in online social networks. IEEE Trans Comput. 2015;64(3):640-653.
-
(2015)
IEEE Trans Comput
, vol.64
, Issue.3
, pp. 640-653
-
-
Wen, S.1
Haghighi, M.S.2
Chen, C.3
Xiang, Y.4
Zhou, W.5
Jia, W.6
-
109
-
-
84880054920
-
Modeling propagation dynamics of social network worms
-
Wen S, Zhou W, Zhang J, Xiang Y, Zhou W, Jia W. Modeling propagation dynamics of social network worms. IEEE Trans Parallel Distrib Syst. 2013;24(8):1633-1643.
-
(2013)
IEEE Trans Parallel Distrib Syst
, vol.24
, Issue.8
, pp. 1633-1643
-
-
Wen, S.1
Zhou, W.2
Zhang, J.3
Xiang, Y.4
Zhou, W.5
Jia, W.6
-
110
-
-
84964318260
-
-
Paper presented at 2015 7th IEEE International Conference on Cloud Computing Technology and Science (CloudCom);, Vancouver, Canada
-
Sun Y, Nanda S, Jaeger T. Security-as-a-service for microservices-based cloud applications. Paper presented at: 2015 7th IEEE International Conference on Cloud Computing Technology and Science (CloudCom); 2015; Vancouver, Canada.
-
(2015)
Security-as-a-service for microservices-based cloud applications
-
-
Sun, Y.1
Nanda, S.2
Jaeger, T.3
-
114
-
-
60049085299
-
Man-in-the-middle attack to the HTTPS protocol
-
Callegati F, Cerroni W, Ramilli M. Man-in-the-middle attack to the HTTPS protocol. IEEE Secur Priv. 2009;7(1):78-81.
-
(2009)
IEEE Secur Priv
, vol.7
, Issue.1
, pp. 78-81
-
-
Callegati, F.1
Cerroni, W.2
Ramilli, M.3
-
116
-
-
85019730828
-
Image texture-based new cryptography scheme using advanced encryption standard
-
Behera H, Mohapatra D, eds., Singapore, Springer
-
Barik RC, Changder S, Sahu SS. Image texture-based new cryptography scheme using advanced encryption standard. In: Behera H, Mohapatra D, eds. Computational Intelligence in Data Mining. Singapore: Springer; 2017.
-
(2017)
Computational Intelligence in Data Mining
-
-
Barik, R.C.1
Changder, S.2
Sahu, S.S.3
-
117
-
-
85063082745
-
Perceptions on the state of the art in verification and validation in cyber-physical systems
-
Zheng X, Julien C, Kim M, Khurshid S. Perceptions on the state of the art in verification and validation in cyber-physical systems. IEEE Syst J. 2015;11.
-
(2015)
IEEE Syst J
, vol.11
-
-
Zheng, X.1
Julien, C.2
Kim, M.3
Khurshid, S.4
-
119
-
-
85019898160
-
Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems
-
Zheng X, Julien C, Chen H, Podorozhny R, Cassez F. Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems. ACM Trans Embed Comput Syst (TECS). 2017;16(4):106.
-
(2017)
ACM Trans Embed Comput Syst (TECS)
, vol.16
, Issue.4
, pp. 106
-
-
Zheng, X.1
Julien, C.2
Chen, H.3
Podorozhny, R.4
Cassez, F.5
-
120
-
-
85134992456
-
-
Paper presented at 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS),, IEEE, Dallas, Texas
-
Zheng X, Julien C, Podorozhny R, Cassez F. Braceassertion: runtime verification of cyber-physical systems. Paper presented at: 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), IEEE; 2015; Dallas, Texas.
-
(2015)
Braceassertion: runtime verification of cyber-physical systems
-
-
Zheng, X.1
Julien, C.2
Podorozhny, R.3
Cassez, F.4
-
121
-
-
85032359348
-
-
Paper presented at 2017 IEEE Trustcom/BigDataSE/ICESS,, IEEE, Sydney, Australia
-
Zheng X, Pan L, Chen H, Di Pietro R, Batten L. A testbed for security analysis of modern vehicle systems. Paper presented at: 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE; 2017; Sydney, Australia.
-
(2017)
A testbed for security analysis of modern vehicle systems
-
-
Zheng, X.1
Pan, L.2
Chen, H.3
Di Pietro, R.4
Batten, L.5
|