Sensor function virtualization to support distributed intelligence in the internet of things [PDF]
It is estimated that-by 2020-billion devices will be connected to the Internet. This number not only includes TVs, PCs, tablets and smartphones, but also billions of embedded sensors that will make up the "Internet of Things" and enable a whole new range
Demeester, Piet +4 more
core +1 more source
Managed ecosystems of networked objects [PDF]
Small embedded devices such as sensors and actuators will become the cornerstone of the Future Internet. To this end, generic, open and secure communication and service platforms are needed in order to be able to exploit the new business opportunities ...
Bouckaert, Stefan +4 more
core +2 more sources
Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network
The controller area network (CAN) is the most widely used in-vehicle network to communicate among electronic control units. However, the CAN does not provide security functionalities, such as encryption or message authentication.
Hyunjin Sun +4 more
doaj +1 more source
Research on Virus Killing Problem Under Virtual Environment [PDF]
The traditional security services mostly put virus killing entities inside the users’ operating systems,which causes huge resource expenditure and waste,and the security software itself is in the unsafe environment,thus being easily destroyed by ...
FENG Wenlin
doaj +1 more source
Research on Security of Virtualization on Cloud Computing
In recent years,followed by developing and popularizing of cloud computing service,the security problems appear. One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers.
Xiaodi Wang +4 more
doaj +2 more sources
Virtualization Security Assessment [PDF]
ABSTRACT Enterprises have been increasingly adopting server virtualization technologies in recent years. Security risk identification and related controls have also been receiving increased discussion lately. i Also, guidance is available on virtualization security configurations from independent groups, such as benchmarks from the Center for Internet ...
openaire +1 more source
Service Migration from Cloud to Multi-tier Fog Nodes for Multimedia Dissemination with QoE Support. [PDF]
A wide range of multimedia services is expected to be offered for mobile users via various wireless access networks. Even the integration of Cloud Computing in such networks does not support an adequate Quality of Experience (QoE) in areas with high ...
Both, Cristiano +6 more
core +2 more sources
Features of information security of computer systems
Presented is a comprehensive analysis of the issues of technological independence and information security of the computing system. The systematic approach involves the analysis of protection technologies at all levels of architecture and its interaction
Dmitry P. Zegzhda, Igor Y. Zhukov
doaj +1 more source
Security challenges of small cell as a service in virtualized mobile edge computing environments [PDF]
Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are ...
A Fragkiadakis +31 more
core +5 more sources
Secure communication technology between network domains based on virtualization avionics platform
In the information interconnection scenario of the new generation wide-body aircraft, there is a large amount of real-time bi-directional data exchange between aircraft control domain and airline information services domain in civil aircraft avionics ...
ZHANG Shuang +5 more
doaj +1 more source

