Security Issues and Privacy Concerns in Industry 4.0 Applications. Группа авторов
Читать онлайн книгу.Gunho Lee et al. “A view of cloud computing.” Communications of the ACM 53, no. 4 (2010): 50-58.
19. Laghari, Asif Ali, Hui He, Muhammad Shafiq, and Asiya Khan. “Assessing effect of Cloud distance on end user’s Quality of Experience (QoE).” In 2016 2nd IEEE international conference on computer and communications (ICCC), pp. 500-505.IEEE, 2016.
20. Laghari, Asif Ali, Hui He, Imtiaz A. Halepoto, M. SullemanMemon, and Sajida Parveen. “Analysis of quality of experience frameworks for cloud computing.” IJCSNS 17, no. 12 (2017): 228.
21. Kumar, Vishal, Asif Ali Laghari, ShahidKarim, Muhammad Shakir, and Ali Anwar Brohi. “Comparison of fog computing & cloud computing.” International Journal of Mathematical Sciences and Computing (IJMSC) 5, no. 1 (2019): 31-41.
22. Manvi, Sunilkumar S., and Gopal Krishna Shyam. “Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey.” Journal of Network and Computer Applications 41 (2014): 424-440.
23. Adhikari, Mainak, Sudarshan Nandy, and Tarachand Amgoth. “Meta heuristic-based task deployment mechanism for load balancing in IaaS cloud.” Journal of Network and Computer Applications 128 (2019): 64-77.
24. Pereira, T., L. Barreto, and A. Amaral. “Network and information security challenges within Industry 4.0 paradigm.” Procedia manufacturing 13 (2017): 1253-1260.
25. Zhong, Ray Y., Xun Xu, Eberhard Klotz, and Stephen T. Newman. “Intelligent manufacturing in the context of industry 4.0: a review.” Engineering 3, no. 5 (2017): 616-630.
26. Preuveneers, Davy, and Elisabeth Ilie-Zudor. “The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0.” Journal of Ambient Intelligence and Smart Environments 9, no. 3 (2017): 287-298.
27. Stock, Tim, and Günther Seliger. “Opportunities of sustainable manufacturing in industry 4.0.” Procedia Cirp 40 (2016): 536-541.
28. Gebhardt, Tobias, and Hans P. Reiser. “Network forensics for cloud computing.” In IFIP International Conference on Distributed Applications and Interoperable Systems, pp. 29-42. Springer, Berlin, Heidelberg, 2013.
29. Wei, Jinpeng, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, and Peng Ning. “Managing security of virtual machine images in a cloud environment.” In Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 91-96. 2009.
30. Crowell, Susan F., Jason A. Nikolai, and Andrew T. Thorstensen. “Virtual machine trust isolation in a cloud environment.” U.S. Patent Application 13/969,705, filed February 19, 2015.
31. Scott-Nash, Mark E. “Roots-of-trust for measurement of virtual machines.” U.S. Patent 9,053,059, issued June 9, 2015.
32. Ramarathinam, Aravind, and Srivatsan Parthasarathy. “Allocating identified intermediary tasks for requesting virtual machines within a trust sphere on a processing goal.” U.S. Patent 9,342,326, issued May 17, 2016.
33. Kent, Karen, Suzanne Chevalier, Tim Grance, and Hung Dang. “Guide to integrating forensic techniques into incident response.” NIST Special Publication 10, no. 14 (2006): 800-86.
34. Milojičić, Dejan, Ignacio M. Llorente, and Ruben S. Montero. “Opennebula: A cloud management tool.” IEEE Internet Computing 15, no. 2 (2011): 11-14.
35. Ismaeel, Salam, Ali Miri, Dharmendra Chourishi, and SM Reza Dibaj. “Open source cloud management platforms: A review.” In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 470-475. IEEE, 2015.
36. Dargahi, Tooska, Ali Dehghantanha, and Mauro Conti. “Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.” In Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 185-204. Syngress, 2017.
37. Barrowclough, John Patrick, and Rameez Asif. “Securing cloud hypervisors: A survey of the threats, vulnerabilities, and countermeasures.” Security and Communication Networks 2018 (2018).
38. Stergiou, Christos L., Andreas P. Plageras, Konstantinos E. Psannis, and Brij B. Gupta. “Secure machine learning scenario from big data in cloud computing via internet of things network.” In Handbook of Computer Networks and Cyber Security, pp. 525-554. Springer, Cham, 2020.
39. Chang, David Yu, Messaoud Benantar, John Yow-Chun Chang, and Vishwanath Venkataramappa. “Authentication and authorization methods for cloud computing security.” U.S. Patent 8,769,622 issued July 1, 2014.
40. Xue, Colin Ting Si, and Felicia Tiong Wee Xin. “Benefits and challenges of the adoption of cloud computing in business.” International Journal on Cloud Computing: Services and Architecture 6, no. 6 (2016): 1-15.
1 *Corresponding author: [email protected]
Конец ознакомительного фрагмента.
Текст предоставлен ООО «ЛитРес».
Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.
Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.