Applying Security to a Big Stream Cloud Architecture for the Internet of Things.
Laura BelliSimone CiraniLuca DavoliGianluigi FerrariLorenzo MelegariMarco PiconePublished in: Int. J. Distributed Syst. Technol. (2016)
Keyphrases
- cloud computing
- big data
- real time
- key technologies
- security architecture
- cloud computing environment
- cloud storage
- enterprise systems
- data streams
- digital rights management
- information security
- security issues
- computing platform
- mobile devices
- access control
- distributed multimedia
- security policies
- security requirements
- key management
- intrusion detection
- intrusion detection and prevention
- ubiquitous computing
- physical world
- network security
- security protocols
- rfid technology
- data center
- service management
- open source