[1] 施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展.2017,(5).DOI:10.7544/issn1000-1239.2017.20160941 .
[2] Roman, Rodrigo,Lopez, Javier,Mambo, Masahiro.Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges[J].Future generations computer systems: FGCS.2018,78(Pt.2).680-698.DOI:10.1016/j.future.2016.11.009 .
[3] Zuo, Cong,Shao, Jun,Wei, Guiyi,等.CCA-secure ABE with outsourced decryption for fog computing[J].Future generations computer systems: FGCS.2018,78(Pt.2).730-738.DOI:10.1016/j.future.2016.10.028 .
[4] Khalid Mahmood,Shehzad Ashraf Chaudhry,Husnain Naqvi,等.An elliptic curve cryptography based lightweight authentication scheme for smart grid communication[J].Future generations computer systems: FGCS.2018.81557-565.DOI:10.1016/j.future.2017.05.002 .
[5] Zhang, Peng,Chen, Zehong,Liu, Joseph K.,等.An efficient access control scheme with outsourcing capability and attribute update for fog computing[J].Future generations computer systems: FGCS.2018,78(Pt.2).753-762.DOI:10.1016/j.future.2016.12.015 .
[6] Xue, Kaiping,Xue, Yingjie,Hong, Jianan,等.RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage[J].IEEE transactions on information forensics and security.2017,12(8).953-967.DOI:10.1109/TIFS.2016.2647222 .
[7] Nasir Abbas,Yan Zhang,Amir Taherkordi,等.Mobile Edge Computing: A Survey[J].IEEE internet of things journal.2017,5(1).450-465.DOI:10.1109/JIOT.2017.2750180 .
[8] Gupta, Harshit,Dastjerdi, Amir Vahid,Ghosh, Soumya K.,等.iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments[J].Software: Practice and experience.2017,47(9).1275-1296.DOI:10.1002/spe.2509 .
[9] Sookhak, Mehdi,Gani, Abdullah,Khan, Muhammad Khurram,等.Dynamic remote data auditing for securing big data storage in cloud computing[J].Information Sciences: An International Journal.2017.380101-116.DOI:10.1016/j.ins.2015.09.004 .
[10] 佚名.A Survey on Mobile Edge Computing: The Communication Perspective[J].IEEE Communications Surveys & Tutorials.2017.1-1.DOI:10.1109/comst.2017.2745201 .
相关知识
大数据安全与隐私保护技术
如何确保农业数据安全与隐私保护?
花所Flower隐私保护技术应用:保障用户隐私安全的先锋
隐私保护与开放共享:AI时代的教育数据治理变革
聚焦人脸数据安全与隐私保护,你的个人信息安全吗?
幼儿花名册的数据如何进行隐私保护?
【干货】校园安全 | 保护好学生的隐私
信息学院孟小峰团队在安全和隐私领域顶级会议发表论文
医疗大健康产品设计中的隐私保护与数据安全策略|绿创设计
基于大数据和云计算网络空间安全防御的研究
网址: 边缘计算数据安全与隐私保护研究综述 https://m.huajiangbk.com/newsview2155243.html
上一篇: 数字化时代的数据安全与隐私保护困 |
下一篇: 安永:数据安全与隐私保护实践及未 |