Nothing Special   »   [go: up one dir, main page]

Tourani et al., 2019 - Google Patents

Towards security-as-a-service in multi-access edge

Tourani et al., 2019

View PDF
Document ID
2588553472199157789
Author
Tourani R
Bos A
Misra S
Esposito F
Publication year
Publication venue
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing

External Links

Snippet

The prevailing network security measures are often implemented on proprietary appliances that are deployed at fixed network locations with constant capacity. Such a rigid deployment is sometimes necessary, but undermines the flexibility of security services in meeting the …
Continue reading at dl.acm.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Yi et al. Security and privacy issues of fog computing: A survey
US10706427B2 (en) Authenticating and enforcing compliance of devices using external services
US11949656B2 (en) Network traffic inspection
US10904240B2 (en) System and method of verifying network communication paths between applications and services
US10958662B1 (en) Access proxy platform
Yan et al. A security and trust framework for virtualized networks and software‐defined networking
US10230696B2 (en) System, apparatus and method for managing lifecycle of secure publish-subscribe system
US11457040B1 (en) Reverse TCP/IP stack
US10425411B2 (en) Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication
US9357331B2 (en) Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication
US11637702B2 (en) Verifiable computation for cross-domain information sharing
Tourani et al. Towards security-as-a-service in multi-access edge
US10218704B2 (en) Resource access control using named capabilities
US10158610B2 (en) Secure application communication system
Sahana et al. Secure authentication framework for sdn-iot network using keccak-256 and bliss-b algorithms
Krol et al. Open security issues for edge named function environments
Bradatsch et al. ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture
Daoud et al. Fog computing network security based on resources management
Krishna et al. Security on Data Auditing Protocols for Cloud Storage Data
US20240146727A1 (en) Exchange engine for secure access service edge (sase) provider roaming
Alkhamisi et al. Privacy-aware Decentralized and Scalable Access Control Management for IoT Environment
Kumar et al. A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems