Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the...
Сохранить в:
| Главные авторы: | Shiriaev, E. M., Ширяев, Е. М., Kucherov, N. N., Кучеров, Н. Н., Movzalevskaya, V., Мовзалевская, В. |
|---|---|
| Формат: | Статья |
| Язык: | English |
| Опубликовано: |
Springer Science and Business Media Deutschland GmbH
2024
|
| Темы: | |
| Online-ссылка: | https://dspace.ncfu.ru/handle/123456789/29247 |
| Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
Схожие документы
-
Analytical Review of Cryptographic Primitives to Use in Fog Computing
Автор: Shiriaev, E. M., и др.
Опубликовано: (2024) -
A survey on multi-cloud storage security: threats and countermeasures
Автор: Bezuglova, E. S., и др.
Опубликовано: (2023) -
An Approach to Reducing Device Uncertainty in Fog-Cloud Computing
Автор: Kucherov, N. N., и др.
Опубликовано: (2024) -
Enhancing Cloud Security through Efficient Polynomial Approximations for Homomorphic Evaluation of Neural Network Activation Functions
Автор: Babenko, M. G., и др.
Опубликовано: (2024) -
An Approximate Algorithm for Determining the Sign Function of a Number Using Neural Network Methods
Автор: Shiriaev, E. M., и др.
Опубликовано: (2024)