In this paper will be described several possible applications of cognitive and behavioral approaches in Fog and Cloud computing. In particular will be presented the ways of using selected behavioral characteristics for creation of security and cryptographic protocols, dedicated to secure distribution and management of strategic data in Fog and Cloud environment. Some possible applications of using movement and gesture features will be also presented.
CITATION STYLE
Ogiela, M. R., & Ogiela, L. (2018). Behavioral security in cloud and fog computing. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 17, pp. 849–854). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-75928-9_77
Mendeley helps you to discover research relevant for your work.