메뉴 건너뛰기




Volumn 31, Issue 22, 2019, Pages

A survey on security issues in services communication of Microservices-enabled fog applications

Author keywords

container; data; Microservices; network; permission; security

Indexed keywords

APPLICATION PROGRAMS; CONTAINERS; FOG; FOG COMPUTING; NETWORK ARCHITECTURE; NETWORKS (CIRCUITS); SURVEYS;

EID: 85042033766     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.4436     Document Type: Conference Paper
Times cited : (113)

References (121)
  • 1
    • 85015176969 scopus 로고    scopus 로고
    • Challenges and software architecture for fog computing
    • Hao Z, Novak E, Yi S, Li Q. Challenges and software architecture for fog computing. IEEE Internet Comput. 2017;21(2):44-53.
    • (2017) IEEE Internet Comput , vol.21 , Issue.2 , pp. 44-53
    • Hao, Z.1    Novak, E.2    Yi, S.3    Li, Q.4
  • 2
    • 85046096153 scopus 로고    scopus 로고
    • Review of implementing fog computing
    • More P. Review of implementing fog computing. Int J Res Eng Technol. 2015.
    • (2015) Int J Res Eng Technol
    • More, P.1
  • 3
    • 85016275071 scopus 로고    scopus 로고
    • Foud: integrating fog and cloud for 5G-enabled V2G networks
    • Tao M, Ota K, Dong M. Foud: integrating fog and cloud for 5G-enabled V2G networks. IEEE Netw. 2017;31(2):8-13.
    • (2017) IEEE Netw , vol.31 , Issue.2 , pp. 8-13
    • Tao, M.1    Ota, K.2    Dong, M.3
  • 4
    • 84997402736 scopus 로고    scopus 로고
    • The design and architecture of microservices
    • Sill A. The design and architecture of microservices. IEEE Cloud Comput. 2016;3(5):76-80.
    • (2016) IEEE Cloud Comput , vol.3 , Issue.5 , pp. 76-80
    • Sill, A.1
  • 5
    • 84964299970 scopus 로고    scopus 로고
    • Paper presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM);, Liverpool, UK
    • Dong M, Ota K, Liu A. Preserving source-location privacy through redundant fog loop for wireless sensor networks. Paper presented at: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM); 2015; Liverpool, UK.
    • (2015) Preserving source-location privacy through redundant fog loop for wireless sensor networks
    • Dong, M.1    Ota, K.2    Liu, A.3
  • 7
    • 85073668143 scopus 로고    scopus 로고
    • Rancher. RancherOS. 2017. http://rancher.com/rancher-os/
    • (2017) Rancher. RancherOS
  • 8
    • 84969922595 scopus 로고    scopus 로고
    • The promise of edge computing
    • Shi W, Dustdar S. The promise of edge computing. Computer. 2016;49(5):78-81.
    • (2016) Computer , vol.49 , Issue.5 , pp. 78-81
    • Shi, W.1    Dustdar, S.2
  • 9
  • 12
    • 84997542957 scopus 로고    scopus 로고
    • Practical use of microservices in moving workloads to the cloud
    • Linthicum DS. Practical use of microservices in moving workloads to the cloud. IEEE Cloud Comput. 2016;3(5):6-9.
    • (2016) IEEE Cloud Comput , vol.3 , Issue.5 , pp. 6-9
    • Linthicum, D.S.1
  • 13
    • 85012229582 scopus 로고    scopus 로고
    • Security in the cloud
    • Anthes G. Security in the cloud. Commun ACM. 2010;53(11):16-18.
    • (2010) Commun ACM , vol.53 , Issue.11 , pp. 16-18
    • Anthes, G.1
  • 17
    • 85072639060 scopus 로고    scopus 로고
    • Setting up Jenkins on Docker and Cloud
    • Berkeley, CA, Apress
    • Pathania N. Setting up Jenkins on Docker and Cloud. Pro Continuous Delivery. Berkeley, CA: Apress; 2017:115-143.
    • (2017) Pro Continuous Delivery , pp. 115-143
    • Pathania, N.1
  • 19
    • 85073663489 scopus 로고    scopus 로고
    • Paper presented at 2007 Free and Open Source Software Conference;, Skopje, Macedonia
    • Chappell D. Enterprise Service Bus. Paper presented at: 2007 Free and Open Source Software Conference; 2007; Skopje, Macedonia.
    • (2007) Enterprise Service Bus
    • Chappell, D.1
  • 20
    • 84997523709 scopus 로고    scopus 로고
    • The Economics of microservices
    • Singleton A. The Economics of microservices. IEEE Cloud Comput. 2016;3(5):16-20.
    • (2016) IEEE Cloud Comput , vol.3 , Issue.5 , pp. 16-20
    • Singleton, A.1
  • 22
    • 84946103342 scopus 로고    scopus 로고
    • Paper presented at 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO);, Opatija, Croatia
    • Savchenko DI, Radchenko GI, Taipale O. Microservices validation: Mjolnirr platform case study. Paper presented at: 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO); 2015; Opatija, Croatia.
    • (2015) Microservices validation: Mjolnirr platform case study
    • Savchenko, D.I.1    Radchenko, G.I.2    Taipale, O.3
  • 25
    • 85015161312 scopus 로고    scopus 로고
    • An open IoT framework based on microservices architecture
    • Sun L, Li Y, Memon RA. An open IoT framework based on microservices architecture. China Commun. 2017;14(2):154-162.
    • (2017) China Commun , vol.14 , Issue.2 , pp. 154-162
    • Sun, L.1    Li, Y.2    Memon, R.A.3
  • 28
    • 85015190263 scopus 로고    scopus 로고
    • Fog computing for the internet of things: security and privacy issues
    • Alrawais A, Alhothaily A, Hu C, Cheng X. Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 2017;21(2): 34-42.
    • (2017) IEEE Internet Comput , vol.21 , Issue.2 , pp. 34-42
    • Alrawais, A.1    Alhothaily, A.2    Hu, C.3    Cheng, X.4
  • 32
    • 84963690007 scopus 로고    scopus 로고
    • Docker cluster management for the cloud-survey results and own solution
    • Peinl R, Holzschuher F, Pfitzer F. Docker cluster management for the cloud-survey results and own solution. J Grid Comput. 2016;14(2):265-282.
    • (2016) J Grid Comput , vol.14 , Issue.2 , pp. 265-282
    • Peinl, R.1    Holzschuher, F.2    Pfitzer, F.3
  • 33
    • 84979776387 scopus 로고    scopus 로고
    • Paper presented at Proceedings of the 6th International Conference on Cloud Computing and Services Science (CLOSER);, Rome, Italy
    • Pahl C, Jamshidi P. Microservices: a systematic mapping study. Paper presented at: Proceedings of the 6th International Conference on Cloud Computing and Services Science (CLOSER); 2016; Rome, Italy.
    • (2016) Microservices: a systematic mapping study
    • Pahl, C.1    Jamshidi, P.2
  • 34
    • 85009186306 scopus 로고    scopus 로고
    • Understanding cloud-native applications after 10 years of cloud computing-a systematic mapping study
    • Kratzke N, Quint PC. Understanding cloud-native applications after 10 years of cloud computing-a systematic mapping study. J Syst Softw. 2017;126:1-16.
    • (2017) J Syst Softw , vol.126 , pp. 1-16
    • Kratzke, N.1    Quint, P.C.2
  • 37
    • 85073663722 scopus 로고    scopus 로고
    • Paper presented at 2009 Proceedings of the 5th International Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT 2009);, Dublin, Ireland
    • Checconi F, Cucinotta T, Faggioli D, Lipari G. Hierarchical multiprocessor CPU reservations for the Linux kernel. Paper presented at: 2009 Proceedings of the 5th International Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT 2009); 2009; Dublin, Ireland.
    • (2009) Hierarchical multiprocessor CPU reservations for the Linux kernel
    • Checconi, F.1    Cucinotta, T.2    Faggioli, D.3    Lipari, G.4
  • 46
    • 84997418705 scopus 로고    scopus 로고
    • To docker or not to docker: a security perspective
    • Combe T, Martin A, Di Pietro R. To docker or not to docker: a security perspective. IEEE Cloud Computing. 2016;3(5):54-62.
    • (2016) IEEE Cloud Computing , vol.3 , Issue.5 , pp. 54-62
    • Combe, T.1    Martin, A.2    Di Pietro, R.3
  • 47
    • 85019082945 scopus 로고    scopus 로고
    • Paper presented at Proceedings of the 2017 International Conference on Cryptography, Security and Privacy;, Wuhan, China
    • Jian Z, Chen L. A defense method against docker escape attack. Paper presented at: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy; 2017; Wuhan, China.
    • (2017) A defense method against docker escape attack
    • Jian, Z.1    Chen, L.2
  • 50
    • 77954322780 scopus 로고    scopus 로고
    • Paper presented at 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA);, Perth, Australia
    • Dillon T, Wu C, Chang E. Cloud computing: issues and challenges. Paper presented at: 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA); 2010; Perth, Australia.
    • (2010) Cloud computing: issues and challenges
    • Dillon, T.1    Wu, C.2    Chang, E.3
  • 51
    • 78149234791 scopus 로고    scopus 로고
    • Service-oriented computing and cloud computing: challenges and opportunities
    • Wei Y, Blake MB. Service-oriented computing and cloud computing: challenges and opportunities. IEEE Internet Comput. 2011;14(6):72-75.
    • (2011) IEEE Internet Comput , vol.14 , Issue.6 , pp. 72-75
    • Wei, Y.1    Blake, M.B.2
  • 54
    • 74049103479 scopus 로고    scopus 로고
    • Paper presented at 14th ACM Conference on Computer and Communications Security;, Alexandria, VA
    • Juels A, Kaliski BS. PORs: proofs of retrievability for large files. Paper presented at: 14th ACM Conference on Computer and Communications Security; 2007; Alexandria, VA.
    • (2007) PORs: proofs of retrievability for large files
    • Juels, A.1    Kaliski, B.S.2
  • 56
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • Wang C, Ren K, Lou W, Li J. Toward publicly auditable secure cloud data storage services. IEEE Netw. 2010;24(4).
    • (2010) IEEE Netw , vol.24 , Issue.4
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 58
    • 84997171376 scopus 로고    scopus 로고
    • Challenges in delivering software in the cloud as microservices
    • Esposito C, Castiglione A, Choo KKR. Challenges in delivering software in the cloud as microservices. IEEE Cloud Comput. 2016;3(5):10-14.
    • (2016) IEEE Cloud Comput , vol.3 , Issue.5 , pp. 10-14
    • Esposito, C.1    Castiglione, A.2    Choo, K.K.R.3
  • 59
    • 85006043540 scopus 로고    scopus 로고
    • Paper presented at 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging A Better Tomorrow (RTSI);, Bologna, Italy
    • Callegati F, Giallorenzo S, Melis A, Prandini M. Data security issues in MaaS-enabling platforms. Paper presented at: 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging A Better Tomorrow (RTSI); 2016; Bologna, Italy.
    • (2016) Data security issues in MaaS-enabling platforms
    • Callegati, F.1    Giallorenzo, S.2    Melis, A.3    Prandini, M.4
  • 60
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl. 2011;34(1):1-11.
    • (2011) J Netw Comput Appl , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 65
    • 84906242615 scopus 로고    scopus 로고
    • New Algorithms for Secure Outsourcing of Modular Exponentiations
    • Chen X, Li J, Ma J, Tang Q, Lou W. New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans Parallel Distrib Syst. 2014;25(9):2386-2396.
    • (2014) IEEE Trans Parallel Distrib Syst , vol.25 , Issue.9 , pp. 2386-2396
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 66
    • 84893719831 scopus 로고    scopus 로고
    • Identity-based chameleon hashing and signatures without key exposure
    • Chen X, Zhang F, Susilo W, Tian H, Li J, Kim K. Identity-based chameleon hashing and signatures without key exposure. Inform Sci. 2014;265:198-210.
    • (2014) Inform Sci , vol.265 , pp. 198-210
    • Chen, X.1    Zhang, F.2    Susilo, W.3    Tian, H.4    Li, J.5    Kim, K.6
  • 68
    • 84987657487 scopus 로고    scopus 로고
    • Verifiable computation over large database with incremental updates
    • Chen X, Li J, Weng J, Ma J, Lou W. Verifiable computation over large database with incremental updates. IEEE Trans Comput. 2016;65(10):3184-3195.
    • (2016) IEEE Trans Comput , vol.65 , Issue.10 , pp. 3184-3195
    • Chen, X.1    Li, J.2    Weng, J.3    Ma, J.4    Lou, W.5
  • 69
    • 84901032811 scopus 로고    scopus 로고
    • Secure deduplication with efficient and reliable convergent key management
    • Li J, Chen X, Li M, Li J, Lee PP, Lou W. Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst. 2014;25(6):1615-1625.
    • (2014) IEEE Trans Parallel Distrib Syst , vol.25 , Issue.6 , pp. 1615-1625
    • Li, J.1    Chen, X.2    Li, M.3    Li, J.4    Lee, P.P.5    Lou, W.6
  • 71
    • 85028920194 scopus 로고    scopus 로고
    • Secure attribute-based data sharing for resource-limited users in cloud computing
    • Li J, Zhang Y, Chen X, Xiang Y. Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur. 2018;72:1-12.
    • (2018) Comput Secur , vol.72 , pp. 1-12
    • Li, J.1    Zhang, Y.2    Chen, X.3    Xiang, Y.4
  • 72
    • 85023631530 scopus 로고    scopus 로고
    • High performance and security in cloud computing
    • Bu K, Xiao B, Qian Y. High performance and security in cloud computing. Concurr Comput Pract Exp. 2017;29(19).
    • (2017) Concurr Comput Pract Exp , vol.29 , Issue.19
    • Bu, K.1    Xiao, B.2    Qian, Y.3
  • 77
    • 85069962297 scopus 로고    scopus 로고
    • Analysing the security of Google's implementation of OpenID connect
    • Caballero J, Zurutuza U, Rodriguez R, eds., Berlin, Germany, Springer-Verlag
    • Li W, Mitchell CJ. Analysing the security of Google's implementation of OpenID connect. In: Caballero J, Zurutuza U, Rodriguez R, eds. Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin, Germany: Springer-Verlag; 2015.
    • (2015) Detection of Intrusions and Malware, and Vulnerability Assessment
    • Li, W.1    Mitchell, C.J.2
  • 82
    • 85019042766 scopus 로고    scopus 로고
    • A secure mechanism for big data collection in large scale internet of vehicles
    • Guo L, Dong M, Ota K, et al. A secure mechanism for big data collection in large scale internet of vehicles. IEEE Internet Things J. 2017;4(2):601-610.
    • (2017) IEEE Internet Things J , vol.4 , Issue.2 , pp. 601-610
    • Guo, L.1    Dong, M.2    Ota, K.3
  • 83
    • 84971228978 scopus 로고    scopus 로고
    • MEDAPs: secure multientities delegated authentication protocols for mobile cloud computing
    • Zhang L, Wei L, Huang D, Zhang K, Dong M, Ota K. MEDAPs: secure multientities delegated authentication protocols for mobile cloud computing. Secur Commun Netw. 2016;9(16):3777-3789.
    • (2016) Secur Commun Netw , vol.9 , Issue.16 , pp. 3777-3789
    • Zhang, L.1    Wei, L.2    Huang, D.3    Zhang, K.4    Dong, M.5    Ota, K.6
  • 84
    • 84979828898 scopus 로고    scopus 로고
    • A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
    • Wu J, Ota K, Dong M, Li C. A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access. 2016;4:416-424.
    • (2016) IEEE Access , vol.4 , pp. 416-424
    • Wu, J.1    Ota, K.2    Dong, M.3    Li, C.4
  • 85
    • 85025145595 scopus 로고    scopus 로고
    • New advances in future network technologies
    • Qi H, Dong M. New advances in future network technologies. Concurr Comput Pract Exp. 2017;29(16).
    • (2017) Concurr Comput Pract Exp , vol.29 , Issue.16
    • Qi, H.1    Dong, M.2
  • 86
    • 84979981955 scopus 로고    scopus 로고
    • Various solutions for address resolution protocol spoofing attacks
    • Venkataramulu S, Rao DCVG. Various solutions for address resolution protocol spoofing attacks. Int J Sci Res Pub. 2013;3(7):1.
    • (2013) Int J Sci Res Pub , vol.3 , Issue.7 , pp. 1
    • Venkataramulu, S.1    Rao, D.C.V.G.2
  • 87
    • 74549219772 scopus 로고    scopus 로고
    • Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
    • Haataja K, Toivanen P. Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. IEEE Trans Wirel Commun. 2010;9(1).
    • (2010) IEEE Trans Wirel Commun , vol.9 , Issue.1
    • Haataja, K.1    Toivanen, P.2
  • 88
    • 84891816613 scopus 로고    scopus 로고
    • A system for denial-of-service attack detection based on multivariate correlation analysis
    • Tan Z, Jamdagni A, He X, Nanda P, Liu RP. A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans Parallel Distrib Syst. 2014;25(2):447-456.
    • (2014) IEEE Trans Parallel Distrib Syst , vol.25 , Issue.2 , pp. 447-456
    • Tan, Z.1    Jamdagni, A.2    He, X.3    Nanda, P.4    Liu, R.P.5
  • 91
    • 11244304396 scopus 로고    scopus 로고
    • Paper presented at Proceedings of the 3rd ACM Workshop on Wireless Security;, Philadelphia, PA
    • Meyer U, Wetzel S. A man-in-the-middle attack on UMTS. Paper presented at: Proceedings of the 3rd ACM Workshop on Wireless Security; 2004; Philadelphia, PA.
    • (2004) A man-in-the-middle attack on UMTS
    • Meyer, U.1    Wetzel, S.2
  • 93
    • 76749128929 scopus 로고    scopus 로고
    • Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks
    • Nam SY, Kim D, Kim J. Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks. IEEE Commun Lett. 2010;14(2):187-189.
    • (2010) IEEE Commun Lett , vol.14 , Issue.2 , pp. 187-189
    • Nam, S.Y.1    Kim, D.2    Kim, J.3
  • 95
    • 77952402462 scopus 로고    scopus 로고
    • Paper presented at 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA);, Bangalore, India
    • Joshi Y, Das D, Saha S. Mitigating man in the middle attack over secure sockets layer. Paper presented at: 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA); 2009; Bangalore, India.
    • (2009) Mitigating man in the middle attack over secure sockets layer
    • Joshi, Y.1    Das, D.2    Saha, S.3
  • 97
    • 85026774220 scopus 로고    scopus 로고
    • Mitigation of hardware trojan based denial-of-service attack for secure NoCs
    • Boraten T, Kodi A. Mitigation of hardware trojan based denial-of-service attack for secure NoCs. J Parallel Distrib Comput. 2017;111:24-38.
    • (2017) J Parallel Distrib Comput , vol.111 , pp. 24-38
    • Boraten, T.1    Kodi, A.2
  • 98
    • 85040330254 scopus 로고    scopus 로고
    • Feature selection of denial-of-service attacks using entropy and granular computing
    • Khan S, Gani A, Wahab AWA, Singh PK. Feature selection of denial-of-service attacks using entropy and granular computing. Arabian J Sci Eng. 2018;43:499-508.
    • (2018) Arabian J Sci Eng , vol.43 , pp. 499-508
    • Khan, S.1    Gani, A.2    Wahab, A.W.A.3    Singh, P.K.4
  • 99
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: a tutorial
    • Chang RKC. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Mag. 2002;40(10):42-51.
    • (2002) IEEE Commun Mag , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 100
    • 1242287724 scopus 로고    scopus 로고
    • Paper presented at Proceedings of the 2003 Conference on Applications, Technologies, ArchitecturesProtocols for Computer Communications;, Karlsruhe, Germany
    • Hussain A, Heidemann J, Papadopoulos C. A framework for classifying denial of service attacks. Paper presented at: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications; 2003; Karlsruhe, Germany.
    • (2003) A framework for classifying denial of service attacks
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 104
    • 85062919372 scopus 로고    scopus 로고
    • Practical overview of security issues in wireless sensor network applications
    • Radhappa H, Pan L, Zheng JX, Wen S. Practical overview of security issues in wireless sensor network applications. Int J Comput Appl. 2017:1-12.
    • (2017) Int J Comput Appl , pp. 1-12
    • Radhappa, H.1    Pan, L.2    Zheng, J.X.3    Wen, S.4
  • 105
    • 85014119108 scopus 로고    scopus 로고
    • Identifying propagation sources in networks: state-of-the-art and comparative studies
    • Jiang J, Wen S, Yu S, Xiang Y, Zhou W. Identifying propagation sources in networks: state-of-the-art and comparative studies. IEEE Commun Surv Tutorials. 2017;19(1):465-481.
    • (2017) IEEE Commun Surv Tutorials , vol.19 , Issue.1 , pp. 465-481
    • Jiang, J.1    Wen, S.2    Yu, S.3    Xiang, Y.4    Zhou, W.5
  • 106
    • 84901195399 scopus 로고    scopus 로고
    • Modeling the propagation of worms in networks: a survey
    • Wang Y, Wen S, Xiang Y, Zhou W. Modeling the propagation of worms in networks: a survey. IEEE Commun Surv Tutorials. 2014;16(2):942-960.
    • (2014) IEEE Commun Surv Tutorials , vol.16 , Issue.2 , pp. 942-960
    • Wang, Y.1    Wen, S.2    Xiang, Y.3    Zhou, W.4
  • 107
  • 108
    • 84923197121 scopus 로고    scopus 로고
    • Sword with two edges: propagation studies on both positive and negative information in online social networks
    • Wen S, Haghighi MS, Chen C, Xiang Y, Zhou W, Jia W. Sword with two edges: propagation studies on both positive and negative information in online social networks. IEEE Trans Comput. 2015;64(3):640-653.
    • (2015) IEEE Trans Comput , vol.64 , Issue.3 , pp. 640-653
    • Wen, S.1    Haghighi, M.S.2    Chen, C.3    Xiang, Y.4    Zhou, W.5    Jia, W.6
  • 110
    • 84964318260 scopus 로고    scopus 로고
    • Paper presented at 2015 7th IEEE International Conference on Cloud Computing Technology and Science (CloudCom);, Vancouver, Canada
    • Sun Y, Nanda S, Jaeger T. Security-as-a-service for microservices-based cloud applications. Paper presented at: 2015 7th IEEE International Conference on Cloud Computing Technology and Science (CloudCom); 2015; Vancouver, Canada.
    • (2015) Security-as-a-service for microservices-based cloud applications
    • Sun, Y.1    Nanda, S.2    Jaeger, T.3
  • 114
    • 60049085299 scopus 로고    scopus 로고
    • Man-in-the-middle attack to the HTTPS protocol
    • Callegati F, Cerroni W, Ramilli M. Man-in-the-middle attack to the HTTPS protocol. IEEE Secur Priv. 2009;7(1):78-81.
    • (2009) IEEE Secur Priv , vol.7 , Issue.1 , pp. 78-81
    • Callegati, F.1    Cerroni, W.2    Ramilli, M.3
  • 116
    • 85019730828 scopus 로고    scopus 로고
    • Image texture-based new cryptography scheme using advanced encryption standard
    • Behera H, Mohapatra D, eds., Singapore, Springer
    • Barik RC, Changder S, Sahu SS. Image texture-based new cryptography scheme using advanced encryption standard. In: Behera H, Mohapatra D, eds. Computational Intelligence in Data Mining. Singapore: Springer; 2017.
    • (2017) Computational Intelligence in Data Mining
    • Barik, R.C.1    Changder, S.2    Sahu, S.S.3
  • 117
    • 85063082745 scopus 로고    scopus 로고
    • Perceptions on the state of the art in verification and validation in cyber-physical systems
    • Zheng X, Julien C, Kim M, Khurshid S. Perceptions on the state of the art in verification and validation in cyber-physical systems. IEEE Syst J. 2015;11.
    • (2015) IEEE Syst J , vol.11
    • Zheng, X.1    Julien, C.2    Kim, M.3    Khurshid, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.