Architecture and security issues in fog computing applications:
"This book examines security and privacy issues in intelligent fog applications"--
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
[c2020]
|
Schlagworte: | |
Online-Zugang: | DE-863 |
Zusammenfassung: | "This book examines security and privacy issues in intelligent fog applications"-- |
Beschreibung: | 18 PDFs (205 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781799801962 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00226983 | ||
003 | IGIG | ||
005 | 20191001134543.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190904s2020 pau fob 001 0 eng d | ||
010 | |z 2019018305 | ||
020 | |a 9781799801962 |q ebook | ||
020 | |z 9781799801948 |q hardcover | ||
020 | |z 9781799801955 |q paperback | ||
024 | 7 | |a 10.4018/978-1-7998-0194-8 |2 doi | |
035 | |a (CaBNVSL)slc21026427 | ||
035 | |a (OCoLC)1117465371 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.585 |b .A73 2020e | |
082 | 7 | |a 004.67/82 |2 23 | |
245 | 0 | 0 | |a Architecture and security issues in fog computing applications |c Sam Goundar, S. Bharath Bhushan, and Praveen Kumar Rayani, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c [c2020] | |
300 | |a 18 PDFs (205 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Fog resource allocation through machine learning algorithm -- Chapter 2. A novel resource management framework for fog computing by using machine learning algorithm -- Chapter 3. Security issues in fog computing for Internet of things -- Chapter 4. Analysis of identity-based cryptography in Internet of things (IoT) -- Chapter 5. Cloud security architecture based on fully homomorphic encryption -- Chapter 6. Object detection in fog computing using machine learning algorithms -- Chapter 7. Distributed intelligence platform to the edge computing -- Chapter 8. Internet of things and fog computing applications in intelligent transportation systems -- Chapter 9. Agribot -- Chapter 10. Towards efficient resource management in fog computing: a survey and future directions. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book examines security and privacy issues in intelligent fog applications"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | 0 | |a Description based on title screen (IGI Global, viewed 09/04/2019). | |
650 | 0 | |a Cloud computing. | |
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Internet of things. | |
653 | |a Algorithms. | ||
653 | |a Analytics Architecture. | ||
653 | |a Cyber-Physical Systems. | ||
653 | |a Fog Applications. | ||
653 | |a Fog Computing. | ||
653 | |a Intelligent Systems. | ||
653 | |a Lightweight Devices. | ||
653 | |a Machine Learning. | ||
653 | |a Resource allocation. | ||
653 | |a Security Applications. | ||
700 | 1 | |a Bhushan, S. Bharath |d 1990- |e editor. | |
700 | 1 | |a Goundar, Sam |d 1967- |e editor. | |
700 | 1 | |a Rayani, Praveen Kumar |d 1989- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019018305 | |
776 | 0 | 8 | |i Print version: |z 1799801942 |z 9781799801948 |w (DLC) 2019018305 |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-0194-8 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00226983 |
---|---|
_version_ | 1825936817655906304 |
adam_text | |
any_adam_object | |
author2 | Bhushan, S. Bharath 1990- Goundar, Sam 1967- Rayani, Praveen Kumar 1989- |
author2_role | edt edt edt |
author2_variant | s b b sb sbb s g sg p k r pk pkr |
author_facet | Bhushan, S. Bharath 1990- Goundar, Sam 1967- Rayani, Praveen Kumar 1989- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .A73 2020e |
callnumber-search | QA76.585 .A73 2020e |
callnumber-sort | QA 276.585 A73 42020E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Fog resource allocation through machine learning algorithm -- Chapter 2. A novel resource management framework for fog computing by using machine learning algorithm -- Chapter 3. Security issues in fog computing for Internet of things -- Chapter 4. Analysis of identity-based cryptography in Internet of things (IoT) -- Chapter 5. Cloud security architecture based on fully homomorphic encryption -- Chapter 6. Object detection in fog computing using machine learning algorithms -- Chapter 7. Distributed intelligence platform to the edge computing -- Chapter 8. Internet of things and fog computing applications in intelligent transportation systems -- Chapter 9. Agribot -- Chapter 10. Towards efficient resource management in fog computing: a survey and future directions. |
ctrlnum | (CaBNVSL)slc21026427 (OCoLC)1117465371 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03147nam a2200613 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00226983</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20191001134543.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190904s2020 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019018305</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799801962</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799801948</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799801955</subfield><subfield code="q">paperback</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-0194-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc21026427</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1117465371</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.A73 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Architecture and security issues in fog computing applications </subfield><subfield code="c">Sam Goundar, S. Bharath Bhushan, and Praveen Kumar Rayani, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">[c2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">18 PDFs (205 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Fog resource allocation through machine learning algorithm -- Chapter 2. A novel resource management framework for fog computing by using machine learning algorithm -- Chapter 3. Security issues in fog computing for Internet of things -- Chapter 4. Analysis of identity-based cryptography in Internet of things (IoT) -- Chapter 5. Cloud security architecture based on fully homomorphic encryption -- Chapter 6. Object detection in fog computing using machine learning algorithms -- Chapter 7. Distributed intelligence platform to the edge computing -- Chapter 8. Internet of things and fog computing applications in intelligent transportation systems -- Chapter 9. Agribot -- Chapter 10. Towards efficient resource management in fog computing: a survey and future directions.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines security and privacy issues in intelligent fog applications"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 09/04/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Algorithms.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Analytics Architecture.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber-Physical Systems.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fog Applications.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fog Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligent Systems.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Lightweight Devices.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Machine Learning.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Resource allocation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security Applications.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhushan, S. Bharath</subfield><subfield code="d">1990-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goundar, Sam</subfield><subfield code="d">1967-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rayani, Praveen Kumar</subfield><subfield code="d">1989-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019018305</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799801942</subfield><subfield code="z">9781799801948</subfield><subfield code="w">(DLC) 2019018305</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-0194-8</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00226983 |
illustrated | Not Illustrated |
indexdate | 2025-03-07T12:04:06Z |
institution | BVB |
isbn | 9781799801962 |
language | English |
oclc_num | 1117465371 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 18 PDFs (205 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Architecture and security issues in fog computing applications Sam Goundar, S. Bharath Bhushan, and Praveen Kumar Rayani, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global [c2020] 18 PDFs (205 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Fog resource allocation through machine learning algorithm -- Chapter 2. A novel resource management framework for fog computing by using machine learning algorithm -- Chapter 3. Security issues in fog computing for Internet of things -- Chapter 4. Analysis of identity-based cryptography in Internet of things (IoT) -- Chapter 5. Cloud security architecture based on fully homomorphic encryption -- Chapter 6. Object detection in fog computing using machine learning algorithms -- Chapter 7. Distributed intelligence platform to the edge computing -- Chapter 8. Internet of things and fog computing applications in intelligent transportation systems -- Chapter 9. Agribot -- Chapter 10. Towards efficient resource management in fog computing: a survey and future directions. Restricted to subscribers or individual electronic text purchasers. "This book examines security and privacy issues in intelligent fog applications"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 09/04/2019). Cloud computing. Cloud computing Security measures. Internet of things. Algorithms. Analytics Architecture. Cyber-Physical Systems. Fog Applications. Fog Computing. Intelligent Systems. Lightweight Devices. Machine Learning. Resource allocation. Security Applications. Bhushan, S. Bharath 1990- editor. Goundar, Sam 1967- editor. Rayani, Praveen Kumar 1989- editor. IGI Global, publisher. (Original) (DLC)2019018305 Print version: 1799801942 9781799801948 (DLC) 2019018305 |
spellingShingle | Architecture and security issues in fog computing applications Chapter 1. Fog resource allocation through machine learning algorithm -- Chapter 2. A novel resource management framework for fog computing by using machine learning algorithm -- Chapter 3. Security issues in fog computing for Internet of things -- Chapter 4. Analysis of identity-based cryptography in Internet of things (IoT) -- Chapter 5. Cloud security architecture based on fully homomorphic encryption -- Chapter 6. Object detection in fog computing using machine learning algorithms -- Chapter 7. Distributed intelligence platform to the edge computing -- Chapter 8. Internet of things and fog computing applications in intelligent transportation systems -- Chapter 9. Agribot -- Chapter 10. Towards efficient resource management in fog computing: a survey and future directions. Cloud computing. Cloud computing Security measures. Internet of things. |
title | Architecture and security issues in fog computing applications |
title_auth | Architecture and security issues in fog computing applications |
title_exact_search | Architecture and security issues in fog computing applications |
title_full | Architecture and security issues in fog computing applications Sam Goundar, S. Bharath Bhushan, and Praveen Kumar Rayani, editors. |
title_fullStr | Architecture and security issues in fog computing applications Sam Goundar, S. Bharath Bhushan, and Praveen Kumar Rayani, editors. |
title_full_unstemmed | Architecture and security issues in fog computing applications Sam Goundar, S. Bharath Bhushan, and Praveen Kumar Rayani, editors. |
title_short | Architecture and security issues in fog computing applications |
title_sort | architecture and security issues in fog computing applications |
topic | Cloud computing. Cloud computing Security measures. Internet of things. |
topic_facet | Cloud computing. Cloud computing Security measures. Internet of things. |
work_keys_str_mv | AT bhushansbharath architectureandsecurityissuesinfogcomputingapplications AT goundarsam architectureandsecurityissuesinfogcomputingapplications AT rayanipraveenkumar architectureandsecurityissuesinfogcomputingapplications AT igiglobal architectureandsecurityissuesinfogcomputingapplications |