Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
https://dspace.ncfu.ru/handle/123456789/29247Полная запись метаданных
| Поле DC | Значение | Язык |
|---|---|---|
| dc.contributor.author | Shiriaev, E. M. | - |
| dc.contributor.author | Ширяев, Е. М. | - |
| dc.contributor.author | Kucherov, N. N. | - |
| dc.contributor.author | Кучеров, Н. Н. | - |
| dc.contributor.author | Movzalevskaya, V. V. | - |
| dc.contributor.author | Мовзалевская, В. В. | - |
| dc.date.accessioned | 2024-11-27T11:32:00Z | - |
| dc.date.available | 2024-11-27T11:32:00Z | - |
| dc.date.issued | 2024 | - |
| dc.identifier.citation | Shiriaev E., Kucherov N., Movzalevskaya V., Khamidov M. Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems // Lecture Notes in Networks and Systems. - 2024. - 863 LNNS. - pp. 277 - 285. - DOI: 10.1007/978-3-031-72171-7_28 | ru |
| dc.identifier.uri | https://dspace.ncfu.ru/handle/123456789/29247 | - |
| dc.description.abstract | Security is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the computing power of the devices, since the fog in this case is interpreted as a connected space of many low-power devices. To solve this problem, it is possible to use so-called active security methods. This paper proposes modified active security systems based on homomorphic encryption. Homomorphic encryption allows you to process data in encrypted form, which avoids data theft, and the active system itself keeps the data safe from compromised access. Thus, the proposed modification increases the resistance of fog systems to various threats. | ru |
| dc.language.iso | en | ru |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | ru |
| dc.relation.ispartofseries | Lecture Notes in Networks and Systems | - |
| dc.subject | Active security | ru |
| dc.subject | Homomorphic encryption | ru |
| dc.subject | Cryptography | ru |
| dc.subject | Fog computing | ru |
| dc.title | Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems | ru |
| dc.type | Статья | ru |
| vkr.inst | Факультет математики и компьютерных наук имени профессора Н.И. Червякова | ru |
| Располагается в коллекциях: | Статьи, проиндексированные в SCOPUS, WOS | |
Файлы этого ресурса:
| Файл | Размер | Формат | |
|---|---|---|---|
| scopusresults 3268.pdf Доступ ограничен | 127.95 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.