Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: https://dspace.ncfu.ru/handle/123456789/29247
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorShiriaev, E. M.-
dc.contributor.authorШиряев, Е. М.-
dc.contributor.authorKucherov, N. N.-
dc.contributor.authorКучеров, Н. Н.-
dc.contributor.authorMovzalevskaya, V. V.-
dc.contributor.authorМовзалевская, В. В.-
dc.date.accessioned2024-11-27T11:32:00Z-
dc.date.available2024-11-27T11:32:00Z-
dc.date.issued2024-
dc.identifier.citationShiriaev E., Kucherov N., Movzalevskaya V., Khamidov M. Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems // Lecture Notes in Networks and Systems. - 2024. - 863 LNNS. - pp. 277 - 285. - DOI: 10.1007/978-3-031-72171-7_28ru
dc.identifier.urihttps://dspace.ncfu.ru/handle/123456789/29247-
dc.description.abstractSecurity is one of the most important characteristics of systems based on fog computing. If in other distributed systems it is possible to organize security based on cryptographic security systems due to their computing power, then fog computing has limitations. These limitations are related to the computing power of the devices, since the fog in this case is interpreted as a connected space of many low-power devices. To solve this problem, it is possible to use so-called active security methods. This paper proposes modified active security systems based on homomorphic encryption. Homomorphic encryption allows you to process data in encrypted form, which avoids data theft, and the active system itself keeps the data safe from compromised access. Thus, the proposed modification increases the resistance of fog systems to various threats.ru
dc.language.isoenru
dc.publisherSpringer Science and Business Media Deutschland GmbHru
dc.relation.ispartofseriesLecture Notes in Networks and Systems-
dc.subjectActive securityru
dc.subjectHomomorphic encryptionru
dc.subjectCryptographyru
dc.subjectFog computingru
dc.titleModification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systemsru
dc.typeСтатьяru
vkr.instФакультет математики и компьютерных наук имени профессора Н.И. Червяковаru
Располагается в коллекциях:Статьи, проиндексированные в SCOPUS, WOS

Файлы этого ресурса:
Файл РазмерФормат 
scopusresults 3268.pdf
  Доступ ограничен
127.95 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.