Behavioral security in cloud and fog computing

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper will be described several possible applications of cognitive and behavioral approaches in Fog and Cloud computing. In particular will be presented the ways of using selected behavioral characteristics for creation of security and cryptographic protocols, dedicated to secure distribution and management of strategic data in Fog and Cloud environment. Some possible applications of using movement and gesture features will be also presented.

Cite

CITATION STYLE

APA

Ogiela, M. R., & Ogiela, L. (2018). Behavioral security in cloud and fog computing. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 17, pp. 849–854). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-75928-9_77

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free