Nothing Special   »   [go: up one dir, main page]

Aladwan et al., 2019 - Google Patents

Common security criteria for vehicular clouds and internet of vehicles evaluation and selection

Aladwan et al., 2019

View PDF
Document ID
1763335842553196851
Author
Aladwan M
Awaysheh F
Cabaleiro J
Pena T
Alabool H
Alazab M
Publication year
Publication venue
2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

External Links

Snippet

Internet of Things (IoT) is becoming increasingly important to intelligent transportation system stakeholders, including cloud-based vehicular cloud (VC) and internet of vehicles (IoV) paradigms. This new trend involves communication and data exchange between …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
    • G06F12/0806Multiuser, multiprocessor or multiprocessing cache systems
    • G06F12/0815Cache consistency protocols
    • G06F12/0817Cache consistency protocols using directory methods
    • G06F12/0826Limited pointers directories; State-only directories without pointers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches

Similar Documents

Publication Publication Date Title
Ali et al. Multi-access edge computing architecture, data security and privacy: A review
Yousefnezhad et al. Security in product lifecycle of IoT devices: A survey
Pohrmen et al. Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: A survey
Benzaïd et al. Trust in 5G and beyond networks
Cayirci Modeling and simulation as a cloud service: a survey
Yakubu et al. Security challenges in fog-computing environment: a systematic appraisal of current developments
Madi et al. NFV security survey in 5G networks: A three-dimensional threat taxonomy
Golightly et al. Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
Aladwan et al. Common security criteria for vehicular clouds and internet of vehicles evaluation and selection
Li et al. Blockchain-empowered data-driven networks: A survey and outlook
Awaysheh et al. Big data security frameworks meet the intelligent transportation systems trust challenges
Khalid et al. Cybersecurity in Industry 4.0 context: Background, issues, and future directions
Al-Sakran et al. Framework architecture for securing IoT using blockchain, smart contract and software defined network technologies
Chaudhry et al. Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm
Hemmati et al. Blockchain‐based internet of vehicles (BIoV): a systematic review of surveys and reviews
Tauseef et al. Exploring the joint potential of Blockchain and AI for securing Internet of things
De Benedictis et al. Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security
Sukiasyan et al. Secure data exchange in Industrial Internet of Things
Li et al. A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems
Duy et al. B-DAC: a decentralized access control framework on northbound interface for securing SDN using blockchain
Al-Ghuraybi et al. Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems
Spathoulas et al. Towards a secure industrial internet of things
Balistri et al. Design guidelines and a prototype implementation for cyber-resiliency in IT/OT scenarios based on blockchain and edge computing
Al-Sibai et al. IoT cybersecurity threats mitigation via integrated technical and non-technical solutions
Madsen Zero-trust–An Introduction