A comprehensive survey of hardware-assisted security: From the edge to the cloud.
Luigi CoppolinoSalvatore D'AntonioGiovanni MazzeoLuigi RomanoPublished in: Internet Things (2019)
Keyphrases
- cloud computing
- trusted computing
- security issues
- computing platform
- random number generator
- network access
- information security
- low cost
- security policies
- hardware and software
- access control
- real time
- network security
- cloud computing environment
- cloud services
- computer systems
- computer security
- hardware implementation
- security protocols
- security systems
- personal computer
- cloud storage
- edge detection
- computing infrastructure
- security problems
- security requirements
- network management
- statistical databases
- cyber security
- security threats
- key management
- intrusion detection
- edge information
- weighted graph
- encryption algorithms