Fog/Edge Computing For Security, Privacy, and Applications (Record no. 177176)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06025nam a22006135i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-030-57328-7 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423125352.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210104s2021 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783030573287 |
-- | 978-3-030-57328-7 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-030-57328-7 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM043050 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Fog/Edge Computing For Security, Privacy, and Applications |
Medium | [electronic resource] / |
Statement of responsibility, etc | edited by Wei Chang, Jie Wu. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2021. |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2021. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | X, 418 p. 112 illus., 87 illus. in color. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Advances in Information Security, |
International Standard Serial Number | 2512-2193 ; |
Volume number/sequential designation | 83 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part I: Overview of Fog/Edge Computing -- 1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues" -- 2. “An overview of the Edge Computing in Modern Digital Age” -- Part II: Security in Fog/Edge Computing -- 3. "Secure Search and Storage Services in Fog/Edge Computing" -- 4. “Collaborative Intrusion Detection Schemes in Fog-to-Things Computing” -- 5. “On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management” -- Part III: Privacy in Fog/Edge Computing.-6. “Privacy Issues in Edge Computing” -- 7. "Privacy-preserving Edge Video Analytics" -- Part IV: Architectural Design in Fog/Edge Computing -- 8. “Vulnerabilities in Fog/Edge Computing from Architectural Perspectives” -- 9. "Security and Intelligent Management for Fog/Edge Computing Resources" -- 10. “Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing” -- 11. “Blockchain-based Security Servicesfor Fog Computing”. Part V: Applications of Fog/Edge Computing -- 12. “Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions” -- 13. “Security Problems in Edge Computing and Augmented Reality” -- 14. “Towards a Security-aware Deployment of Data Streaming Applications in Fog Computing” -- 15. “Blockchain of Finite-Lifetime Blocks for Edge-IoT Applications”. . |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection |
General subdivision | Law and legislation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Wireless communication systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Mobile communication systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Application software. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Mobile and Network Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Privacy. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Wireless and Mobile Communication. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer and Information Systems Applications. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chang, Wei. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Wu, Jie. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783030573270 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783030573294 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783030573300 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Advances in Information Security, |
-- | 2512-2193 ; |
Volume number/sequential designation | 83 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-030-57328-7">https://doi.org/10.1007/978-3-030-57328-7</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.