2020 International Conference on Computing and Data Science (CDS) 2020
DOI: 10.1109/cds49703.2020.00048
|View full text |Cite
|
Sign up to set email alerts
|

Securing Database Integrity in Intelligent Government Systems that Employ Fog Computing Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…To the best of our knowledge, no schemes have been developed to address damage assessment and data recovery in the context of fog computing. The first works to address such issues in fog computing were presented in [1,14,34]. Authors of these proposed schemes scanned entire log files beginning with the onset of the attack.…”
Section: Data Integrity In Fog Computingmentioning
confidence: 99%
See 3 more Smart Citations
“…To the best of our knowledge, no schemes have been developed to address damage assessment and data recovery in the context of fog computing. The first works to address such issues in fog computing were presented in [1,14,34]. Authors of these proposed schemes scanned entire log files beginning with the onset of the attack.…”
Section: Data Integrity In Fog Computingmentioning
confidence: 99%
“…In [34], the authors proposed a fog computing-based novel approach to secure database integrity in intelligent government systems. In this approach the authors used a fog computing paradigm to secure communications among all a system's entities.…”
Section: Data Integrity In Fog Computingmentioning
confidence: 99%
See 2 more Smart Citations