Author of the publication

Implementation of Fog Nodes in the Tree-Based Fog Computing (TBFC) Model of the IoT.

, , , , , , and . EIDWT, volume 29 of Lecture Notes on Data Engineering and Communications Technologies, page 92-102. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fog Computing Model for the Information Flow Control., , and . NBiS, volume 526 of Lecture Notes in Networks and Systems, page 25-34. Springer, (2022)Design and Implementing of the Dynamic Tree-Based Fog Computing (DTBFC) Model to Realize the Energy-Efficient IoT., , , , and . EIDWT, volume 65 of Lecture Notes on Data Engineering and Communications Technologies, page 71-81. Springer, (2021)Synchronization Protocols to Prevent Illegal Information Flow in Role-Based Access Control Systems., , , , and . CISIS, page 279-286. IEEE Computer Society, (2014)Evaluation of a Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the RBAC Model., , , , and . EIDWT, volume 29 of Lecture Notes on Data Engineering and Communications Technologies, page 80-91. Springer, (2019)Trustworthiness in Peer-to-Peer Systems., , , and . NBiS, page 652-657. IEEE Computer Society, (2015)Energy-aware Migration of Virtual Machines in a Cluster., , , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 21-32. Springer, (2016)A Flexible Read-Write Abortion Protocol to Prevent Illegal Information Flow among Objects., , , and . J. Mobile Multimedia, 11 (3&4): 263-280 (2015)The Group-Based Linear Time Causally Ordering Protocol in a Scalable P2PPS System., , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 471-482. Springer, (2019)A Nodes Selection Algorithm for Fault Recovery in the GTBFC Model., , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 81-92. Springer, (2019)Algorithm for Detecting Implicitly Faulty Replicas Based on the Power Consumption Model., , , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 483-493. Springer, (2019)