Security Issues in Fog Computing from 5G to 6G : Architectures, Applications and Solutions

Chintan Bhatt, Yulei Wu, Saad Harous, Massimo Villari

Informasi Dasar

53 kali
23.21.2057
005.8
Buku - Elektronik (E-Book)
Tel-U Gedung Manterawu Lantai 5 : Rak 4
Tel-U Purwokerto : Rak 2

The book provides an examination of how fog security is changing the information technology industry and will continue to in the next decade. The authors first discuss how fog enables key applications in wireless 5G, the Internet of Things, and big data. The book then presents an overview of fog/edge computing, focusing on its relationship with cloud technology, Internet of Things and the future with the use of secure 5G/6G communication. The book also presents a comprehensive overview of liabilities in fog/edge computing within multi-level architectures and the intelligent management. The last part of the book reviews applications of fog/edge computing in smart cities, including in Industrial IoT, edge-based augmented reality, data streaming, and blockchain-based.

Subjek

DATA SECURITY
 

Katalog

Security Issues in Fog Computing from 5G to 6G : Architectures, Applications and Solutions
978-3-031-08254-2
164p,: pdf file,; 4,0 MB
English

Sirkulasi

Rp. 0
Rp. 0
Tidak

Pengarang

Chintan Bhatt, Yulei Wu, Saad Harous, Massimo Villari
Perorangan
 
 

Penerbit

Springer Cham
New York
2022

Koleksi

Kompetensi

  • TTI4S3 - 5G AND BEYOND
  • TTI4S3 - 5G and Beyond
  • CEC30N3 - 5G AND BEYOND
  • AAK4RBB3 - 5G AND BEYOND
  • TTI7F3 - KOMUNIKASI BERGERAK 5G AND BEYOND
  • IEI5G3 - RELIABILITY DAN MAINTAINABILITY
  • CSI-3I3 - KEAMANAN DATA
  • CSI3I3 - KEAMANAN DATA
  • CDK3CAB3 - KEAMANAN DATA
  • ACK2BAB3 - KEAMANAN JARINGAN

Download / Flippingbook

 

Ulasan

Belum ada ulasan yang diberikan
anda harus sign-in untuk memberikan ulasan ke katalog ini