Author:
Ghaleb Abdkhaleq Mohamed H.,Zamanifar Kamran
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference47 articles.
1. Monsef, M., & Gidado, N. (2011). Trust and privacy concern in the cloud. In European Cup, IT Security for the Next Generation Technical Topics: “In the Cloud”-Security, Erfurt, Germany, pp.1–15.
2. Krishna Sowjanya, K., & Mouleeswaran, S. K. (2022). Resource allocation techniques in cloud computing. In Cloud and Fog Computing Platforms for Internet of Things, 1st ed., London, CRC Press, ch.1, sec. 1, pp. 1-2.
3. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.
4. Yi, S., Li, C., & Li, Q. (2015). A survey of fog computing: concepts, applications and issues. In Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou pp. 37–42.
5. La, Q., Ngo, M., Dinh, T., Quek, T., & Shin, H. (2018). Enabling intelligence in fog computing to achieve energy and latency reduction. Digital Communications and Networks, 5(1), 3–9.