Author:
Rath Annanda,Hristoskova Anna,Klein Sarah
Publisher
Springer International Publishing
Reference9 articles.
1. Abigail, G., Gilad, E., Ron, Sh., Micha, M., Ariel, F.: Data Minimization for GDPR Compliance in Machine Learning Models. IBM Research - Haifa, Haifa University Campus, Haifa, Israel (2020)
2. Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE IoT J. 3(5), 637–646 (2016)
3. Suzan, Al., Nusaybah, A., Muhammad, M.: Survey of centralized and decentralized access control models in cloud computing. Int. J. Adv. Comput. Sci. Appl. 12(2) (2021)
4. Karim, A., Adnan, M.A.: An OpenID based authentication service mechanisms for internet of things. In: 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), Singapore, pp. 687–692 (2019)
5. Zhang, J., Chen, B., Zhao, Y., Cheng, X., Hu, F.: Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6, 18209–18237 (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献