2017 XLIII Latin American Computer Conference (CLEI) 2017
DOI: 10.1109/clei.2017.8226417
|View full text |Cite
|
Sign up to set email alerts
|

On exploring proactive cloud elasticity for internet of things demands

Abstract: Abstract-Today, Internet of Things (IoT) is an emergent concept in which billions of devices are connected to Internet capable of producing and exchanging data. One of the most used technologies in this area regards to the Radio Frequency Identification (RFID). It can produce large amount of data from many things like objects, persons and assets. Thus, it is needed middlewares which must support processing in large scales. However, the state-of-the-art does not present satisfactory solutions in which this kind… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 17 publications
0
1
0
2
Order By: Relevance
“…The prototypes mainly depended on the IoT domain and the purpose of testing. They vary from general testbeds [8], [10] to specific testing strategies such as protocol and scalability testing [11] or system security testing [12].…”
Section: Related Workmentioning
confidence: 99%
“…The prototypes mainly depended on the IoT domain and the purpose of testing. They vary from general testbeds [8], [10] to specific testing strategies such as protocol and scalability testing [11] or system security testing [12].…”
Section: Related Workmentioning
confidence: 99%
“…O CapBAC propõe um novo modelo de confiança baseado na lógica fuzzy, que é o pilar do TACIoT. Esse modelo segue a abordagem multidimensional para possibilitar uma computação de valor confiável e preciso para dispositivos IoT [17]. Diferente de modelos anteriores que apenas consideram a reputação e o feedback, utiliza os aspectos de segurança e os fatores sociais entre dispositivos IoT, que são utilizados por objetos inteligentes para conduzir lógica do controle de acesso.…”
Section: Trabalhos Relacionados Os Autores Emunclassified
“…Esses dispositivos são capazes de coletar e processar dados e de se comunicar por meio de uma rede [Goudos et al 2017]. Embora hoje o termo seja utilizado de forma bem mais abrangente, incluindo aplicações de saúde, logística, segurança, agricultura, entre outros, o objetivo principal é fazer com que os computadores capturem as informações do mundo real sem intervenção humana contínua [Rodrigues et al 2017].…”
Section: Introductionunclassified