Service Level Management in Emerging Environments. Nader Mbarek

Чтение книги онлайн.

Читать онлайн книгу Service Level Management in Emerging Environments - Nader Mbarek страница 18

Service Level Management in Emerging Environments - Nader Mbarek

Скачать книгу

[Accessed 2 November 2018].

      Babiarz, J., Chan, K., and Baker, F. (2006). Configuration guidelines for DiffServ Service classes [Online]. Memo, IETF, 4594. Available at: https://tools.ietf.org/html/rfc4594.

      Balte, A., Kashid, A., and Patil, B. (2015). Security issues in Internet of Things (IoT): A survey. International Journal of Advanced Research in Computer Science and Software Engineering, 5(4), 450–455.

      Bhaddurgatte, R.C. and Kumar, V. (2015). Review: QoS architecture and implementations in IoT environment. Research & Reviews: Journal of Engineering and Technology, S1, 6–12.

      Braden, R., Clark, D., and Shenker, S. (1994). Integrated services in the Internet architecture: An overview [Online]. Memo, IETF, 1633. Available at: https://tools.ietf.org/html/rfc1633.

      Cantora. (2013). Mirror of AVR-Crypto-Lib. GitHub.

      Chowdhury, A., Mukherjee, S., and Souray Banerjee, S. (2018). Examining of QoS in Cloud Computing Technologies and IoT Services. Hershey, PA.

      CORDIS. (2018). Butler [Online]. Available at: https://cordis.europa.eu/project/rcn/101349/factsheet/en [Accessed 5 November 2018].

      Davidson, M. and Schmidt, C. (2014). TAXII overview. Report. The MITRE Corporation, McLean.

      Dong, C., Chang, G., Sun, D., Li, J., Jia, J., and Wang, X. (2011). TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things. Computer Science and Information Systems, 8(4), 1207–1228.

      Duan, R., Chen, X., and Xing, T. (2011). A QoS Architecture for IOT. International Conference on Internet of Things, and International Conference on Cyber, Physical and Social Computing. Dalian, China, 717–720.

      Ericsson. (2018). Ericsson and partners demonstrate battery life improvements in Massive IoT e-health wearable prototype [Online]. Available at: https://www.ericsson.com/en/news/2018/8/connected-e-health-IoT [Accessed 2 November 2018].

      Google’s Internet of Things Solutions. (2018). Build smart devices with Google [Online]. Available at: https://developers.google.com/iot/ [Accessed 5 July 2018].

      Grugen, L., (2018). Updated use cases, requirements and architecture. BigClouT.

      GSMA (2016). IoT security guidelines overview document version 1.1. GSMA Association, London.

      Gubbi, J., Buyya, R., Marusic, S. et al. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29, 1645–1660.

      Hamze, M. (2015). Autonomie, sécurité et QoS de bout en bout dans un environnement de Cloud Computing. PhD Thesis, University of Burgundy, Dijon.

      Hanna, S. (2015). The untrusted IoT: A path to securing billions of insecure devices. Trusted Computing Group.

      IEEE Standards Association. (2018). IEEE standard for local and metropolitan area networks – Secure device identity [Online]. IEEE 802.1AR-2018. Available at: https://standards.ieee.org/standard/8021AR-2018.html [Accessed 5 November 2018].

      International Electrotechnical Commission (IEC). (2017a). Orchestrating Infrastructure for Sustainable Smart Cities. White book, IEC, Geneva.

      International Electrotechnical Commission (IEC). (2017b). IEC Role in the IoT. White book, IEC, Geneva.

      International Electrotechnical Commission. (2018). Interconnection of information technology equipment [Online]. IEC, Geneva. Available at: https://www.iec.ch/dyn/www/f?p=103:7:0::::FSP_ORG_ID,FSP_LANG_ID:3399,25 [Accessed 2 November 2018].

      ISO/IEC. (2015a). Internet of Things (IoT). Report, ISO, Geneva.

      ISO/IEC. (2015b). Information technology, trusted platform module library – Part 1: Architecture. Standard, ISO, Geneva.

      ITU-T. (1991). Architecture de sécurité pour l’interconnexion en systèmes ouverts d’applications du CCITT [Online]. Recommendation, ITU. Available at: https://www.itu.int/rec/T-REC-X.800-199103-I/fr.

      ITU-T (2014). Y.2066: Next generation networks – Frameworks and functional archi-tecture models. Recommendation, ITU.

      Official Journal of the European Union. (2016). Règlement (UE) 2016/679 du Parlement européen et du Conseil du 27 avril 2016 relatif à la protection des personnes physiques à l’égard du traitement des données à caractère personnel et à la libre circulation de ces données, et abrogeant la directive 95/46/CE (règlement général sur la protection des données). Regulation, European Union, Brussels.

      Official Journal L 281. (1995). Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Regulation, European Commission, Brussels.

      Khalil, A., Mbarek, N., and Togni, O. (2017). Service level guarantee framework for IoT environments. First International Conference on Internet of Things and Machine Learning. IML, Liverpool.

      Khalil, A., Mbarek, N., and Togni, O. (2018). IoT service QoS guarantee using QBAIoT wireless access method. Fourth International Conference on Mobile, Secure, Programmable Networks. MSPN, Paris.

      Khodkari, H., Ghazi-Maghrebi, S., and Asosheh, A. (2017). Assurance of QoS in the Integration of Cloud Services and Internet of Things. International Symposium on Networks, Computers and Communications. Marrakech.

      Kirsche, M. (2018). IEEE 802.15.4-standalone [Online]. GitHub. Available at: https://github.com/michaelkirsche/IEEE802154INET-Standalone.

      Knight, P. (2010). Cryptographic suite for Arduino (SHA, HMAC-SHA) [Online]. GitHub. Available at: https://github.com/Cathedrow/Cryptosuite.

      Lee, G.M., Park, J., Kong, N. et al. (2012). The Internet of Things: Concept and problem statement [Online]. Memo, IRTF. Available at: https://illumine.wp.imtbs-tsp.eu/files/2012/01/8-draft-lee-iot-problem-statement-00.txt.

      Li, S. and Li, D.X. (2017). IoT Node Authentication.

Скачать книгу