Aladwan et al., 2019 - Google Patents
Common security criteria for vehicular clouds and internet of vehicles evaluation and selectionAladwan et al., 2019
View PDF- Document ID
- 1763335842553196851
- Author
- Aladwan M
- Awaysheh F
- Cabaleiro J
- Pena T
- Alabool H
- Alazab M
- Publication year
- Publication venue
- 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
External Links
Snippet
Internet of Things (IoT) is becoming increasingly important to intelligent transportation system stakeholders, including cloud-based vehicular cloud (VC) and internet of vehicles (IoV) paradigms. This new trend involves communication and data exchange between …
- 238000011156 evaluation 0 title abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
- G06F12/0806—Multiuser, multiprocessor or multiprocessing cache systems
- G06F12/0815—Cache consistency protocols
- G06F12/0817—Cache consistency protocols using directory methods
- G06F12/0826—Limited pointers directories; State-only directories without pointers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ali et al. | Multi-access edge computing architecture, data security and privacy: A review | |
Yousefnezhad et al. | Security in product lifecycle of IoT devices: A survey | |
Pohrmen et al. | Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: A survey | |
Benzaïd et al. | Trust in 5G and beyond networks | |
Cayirci | Modeling and simulation as a cloud service: a survey | |
Yakubu et al. | Security challenges in fog-computing environment: a systematic appraisal of current developments | |
Madi et al. | NFV security survey in 5G networks: A three-dimensional threat taxonomy | |
Golightly et al. | Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN | |
Aladwan et al. | Common security criteria for vehicular clouds and internet of vehicles evaluation and selection | |
Li et al. | Blockchain-empowered data-driven networks: A survey and outlook | |
Awaysheh et al. | Big data security frameworks meet the intelligent transportation systems trust challenges | |
Khalid et al. | Cybersecurity in Industry 4.0 context: Background, issues, and future directions | |
Al-Sakran et al. | Framework architecture for securing IoT using blockchain, smart contract and software defined network technologies | |
Chaudhry et al. | Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm | |
Hemmati et al. | Blockchain‐based internet of vehicles (BIoV): a systematic review of surveys and reviews | |
Tauseef et al. | Exploring the joint potential of Blockchain and AI for securing Internet of things | |
De Benedictis et al. | Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security | |
Sukiasyan et al. | Secure data exchange in Industrial Internet of Things | |
Li et al. | A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems | |
Duy et al. | B-DAC: a decentralized access control framework on northbound interface for securing SDN using blockchain | |
Al-Ghuraybi et al. | Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems | |
Spathoulas et al. | Towards a secure industrial internet of things | |
Balistri et al. | Design guidelines and a prototype implementation for cyber-resiliency in IT/OT scenarios based on blockchain and edge computing | |
Al-Sibai et al. | IoT cybersecurity threats mitigation via integrated technical and non-technical solutions | |
Madsen | Zero-trust–An Introduction |