Tourani et al., 2019 - Google Patents
Towards security-as-a-service in multi-access edgeTourani et al., 2019
View PDF- Document ID
- 2588553472199157789
- Author
- Tourani R
- Bos A
- Misra S
- Esposito F
- Publication year
- Publication venue
- Proceedings of the 4th ACM/IEEE Symposium on Edge Computing
External Links
Snippet
The prevailing network security measures are often implemented on proprietary appliances that are deployed at fixed network locations with constant capacity. Such a rigid deployment is sometimes necessary, but undermines the flexibility of security services in meeting the …
- 230000003190 augmentative 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yi et al. | Security and privacy issues of fog computing: A survey | |
US11949656B2 (en) | Network traffic inspection | |
US10904240B2 (en) | System and method of verifying network communication paths between applications and services | |
US10706427B2 (en) | Authenticating and enforcing compliance of devices using external services | |
US10958662B1 (en) | Access proxy platform | |
Yan et al. | A security and trust framework for virtualized networks and software‐defined networking | |
US10230696B2 (en) | System, apparatus and method for managing lifecycle of secure publish-subscribe system | |
US10425411B2 (en) | Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication | |
US9357331B2 (en) | Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication | |
US11457040B1 (en) | Reverse TCP/IP stack | |
US12058265B2 (en) | Verifiable computation for cross-domain information sharing | |
Tourani et al. | Towards security-as-a-service in multi-access edge | |
US10218704B2 (en) | Resource access control using named capabilities | |
US10158610B2 (en) | Secure application communication system | |
Sahana et al. | Secure authentication framework for sdn-iot network using keccak-256 and bliss-b algorithms | |
Krol et al. | Open security issues for edge named function environments | |
Bradatsch et al. | ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture | |
Daoud et al. | Fog computing network security based on resources management | |
Krishna et al. | Security on Data Auditing Protocols for Cloud Storage Data | |
US20240146727A1 (en) | Exchange engine for secure access service edge (sase) provider roaming | |
Alkhamisi et al. | Privacy-aware Decentralized and Scalable Access Control Management for IoT Environment | |
Kumar et al. | A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems |