共 22 条
- [2] An efficient access control scheme with outsourcing capability and attribute update for fog computing[J] . Peng Zhang,Zehong Chen,Joseph K. Liu,Kaitai Liang,Hongwei Liu.Future Generation Computer Systems . 2018
- [3] iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments[J] . Harshit Gupta,Amir Vahid Dastjerdi,Soumya K. Ghosh,Rajkumar Buyya.Software: Practice and Experience . 2017 (9)
- [4] Attribute-based authorization for structured Peer-to-Peer (P2P) networks[J] . Diego Suárez Touceda,José M. Sierra Cámara,Sherali Zeadally,Miguel Soriano.Computer Standards & Interfaces . 2015
- [5] An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing[J] . Syam Kumar Pasupuleti,Subramanian Ramalingam,Rajkumar Buyya.Journal of Network and Computer Applications . 2015
- [6] Edge-centric Computing[J] . Pedro Garcia Lopez,Alberto Montresor,Dick Epema,Anwitaman Datta,Teruo Higashino,Adriana Iamnitchi,Marinho Barcellos,Pascal Felber,Etienne Riviere.ACM SIGCOMM Computer Communication Review . 2015 (5)
- [7] Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing[J] . Xu Yang,Xinyi Huang,Joseph K. Liu.Future Generation Computer Systems . 2015
- [8] Dynamic remote data auditing for securing big data storage in cloud computing[J] . Mehdi Sookhak,Abdullah Gani,Muhammad Khurram Khan,Rajkumar Buyya.Information Sciences . 2015
- [9] A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing[J] . Kaitai Liang,Man Ho Au,Joseph K. Liu,Willy Susilo,Duncan S. Wong,Guomin Yang,Yong Yu,Anjia Yang.Future Generation Computer Systems . 2014
- [10] Consolidated Identity Management System for secure mobile cloud computing[J] . Issa Khalil,Abdallah Khreishah,Muhammad Azeem.Computer Networks . 2014