Security Issues and Privacy Concerns in Industry 4.0 Applications. Группа авторов. Читать онлайн. Newlib. NEWLIB.NET

Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781119776505
Скачать книгу
Gunho Lee et al. “A view of cloud computing.” Communications of the ACM 53, no. 4 (2010): 50-58.

      19. Laghari, Asif Ali, Hui He, Muhammad Shafiq, and Asiya Khan. “Assessing effect of Cloud distance on end user’s Quality of Experience (QoE).” In 2016 2nd IEEE international conference on computer and communications (ICCC), pp. 500-505.IEEE, 2016.

      20. Laghari, Asif Ali, Hui He, Imtiaz A. Halepoto, M. SullemanMemon, and Sajida Parveen. “Analysis of quality of experience frameworks for cloud computing.” IJCSNS 17, no. 12 (2017): 228.

      21. Kumar, Vishal, Asif Ali Laghari, ShahidKarim, Muhammad Shakir, and Ali Anwar Brohi. “Comparison of fog computing & cloud computing.” International Journal of Mathematical Sciences and Computing (IJMSC) 5, no. 1 (2019): 31-41.

      22. Manvi, Sunilkumar S., and Gopal Krishna Shyam. “Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey.” Journal of Network and Computer Applications 41 (2014): 424-440.

      23. Adhikari, Mainak, Sudarshan Nandy, and Tarachand Amgoth. “Meta heuristic-based task deployment mechanism for load balancing in IaaS cloud.” Journal of Network and Computer Applications 128 (2019): 64-77.

      24. Pereira, T., L. Barreto, and A. Amaral. “Network and information security challenges within Industry 4.0 paradigm.” Procedia manufacturing 13 (2017): 1253-1260.

      25. Zhong, Ray Y., Xun Xu, Eberhard Klotz, and Stephen T. Newman. “Intelligent manufacturing in the context of industry 4.0: a review.” Engineering 3, no. 5 (2017): 616-630.

      26. Preuveneers, Davy, and Elisabeth Ilie-Zudor. “The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0.” Journal of Ambient Intelligence and Smart Environments 9, no. 3 (2017): 287-298.

      27. Stock, Tim, and Günther Seliger. “Opportunities of sustainable manufacturing in industry 4.0.” Procedia Cirp 40 (2016): 536-541.

      28. Gebhardt, Tobias, and Hans P. Reiser. “Network forensics for cloud computing.” In IFIP International Conference on Distributed Applications and Interoperable Systems, pp. 29-42. Springer, Berlin, Heidelberg, 2013.

      29. Wei, Jinpeng, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, and Peng Ning. “Managing security of virtual machine images in a cloud environment.” In Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 91-96. 2009.

      30. Crowell, Susan F., Jason A. Nikolai, and Andrew T. Thorstensen. “Virtual machine trust isolation in a cloud environment.” U.S. Patent Application 13/969,705, filed February 19, 2015.

      31. Scott-Nash, Mark E. “Roots-of-trust for measurement of virtual machines.” U.S. Patent 9,053,059, issued June 9, 2015.

      32. Ramarathinam, Aravind, and Srivatsan Parthasarathy. “Allocating identified intermediary tasks for requesting virtual machines within a trust sphere on a processing goal.” U.S. Patent 9,342,326, issued May 17, 2016.

      33. Kent, Karen, Suzanne Chevalier, Tim Grance, and Hung Dang. “Guide to integrating forensic techniques into incident response.” NIST Special Publication 10, no. 14 (2006): 800-86.

      34. Milojičić, Dejan, Ignacio M. Llorente, and Ruben S. Montero. “Opennebula: A cloud management tool.” IEEE Internet Computing 15, no. 2 (2011): 11-14.

      35. Ismaeel, Salam, Ali Miri, Dharmendra Chourishi, and SM Reza Dibaj. “Open source cloud management platforms: A review.” In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 470-475. IEEE, 2015.

      36. Dargahi, Tooska, Ali Dehghantanha, and Mauro Conti. “Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.” In Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 185-204. Syngress, 2017.

      37. Barrowclough, John Patrick, and Rameez Asif. “Securing cloud hypervisors: A survey of the threats, vulnerabilities, and countermeasures.” Security and Communication Networks 2018 (2018).

      38. Stergiou, Christos L., Andreas P. Plageras, Konstantinos E. Psannis, and Brij B. Gupta. “Secure machine learning scenario from big data in cloud computing via internet of things network.” In Handbook of Computer Networks and Cyber Security, pp. 525-554. Springer, Cham, 2020.

      39. Chang, David Yu, Messaoud Benantar, John Yow-Chun Chang, and Vishwanath Venkataramappa. “Authentication and authorization methods for cloud computing security.” U.S. Patent 8,769,622 issued July 1, 2014.

      40. Xue, Colin Ting Si, and Felicia Tiong Wee Xin. “Benefits and challenges of the adoption of cloud computing in business.” International Journal on Cloud Computing: Services and Architecture 6, no. 6 (2016): 1-15.

      1 *Corresponding author: [email protected]

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/7SNyUGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAADUcAVoAAxsl RxwCAAACAAAcAlAAB3NkZWNrZXIcAgUAFTk3ODExMTk3NzU2MjFfY3ZyLnBkZgA4QklNBCUAAAAA ABDPKgx/XglhPw+8SF9X5TNkOEJJTQQ6AAAAAADlAAAAEAAAAAEAAAAAAAtwcmludE91dHB1dAAA AAUAAAAAUHN0U2Jvb2wBAAAAAEludGVlbnVtAAAAAEludGUAAAAAQ2xybQAAAA9wcmludFNpeHRl ZW5CaXRib29sAAAAAAtwcmludGVyTmFtZVRFWFQAAAABAAAAAAAPcHJpbnRQcm9vZlNldHVwT2Jq YwAAAAwAUAByAG8AbwBmACAAUwBlAHQAdQBwAAAAAAAKcHJvb2ZTZXR1cAAAAAEAAAAAQmx0bmVu dW0AAAAMYnVpbHRpblByb29mAAAACXByb29mQ01ZSwA4QklNBDsAAAAAAi0AAAAQAAAAAQAAAAAA EnByaW50T3V0cHV0T3B0aW9ucwAAABcAAAAAQ3B0bmJvb2wAAAAAAENsYnJib29sAAAAAABSZ3NN Ym9vbAAAAAAAQ3JuQ2Jvb2wAAAAAAENudENib29sAAAAAABMYmxzYm9vbAAAAAAATmd0dmJvb2wA AAAAAEVtbERib29sAAAAAABJbnRyYm9vbAAAAAAAQmNrZ09iamMAAAABAAAAAAAAUkdCQwAAAAMA AAAAUmQgIGRvdWJAb+AAAAAAAAAAAABHcm4gZG91YkBv4