A Study on the Security Algorithm for Contexts in Smart Cities
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F44555601%3A13440%2F14%3A43885929" target="_blank" >RIV/44555601:13440/14:43885929 - isvavai.cz</a>
Výsledek na webu
<a href="http://dx.doi.org/10.1155/2014/102051" target="_blank" >http://dx.doi.org/10.1155/2014/102051</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1155/2014/102051" target="_blank" >10.1155/2014/102051</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
A Study on the Security Algorithm for Contexts in Smart Cities
Popis výsledku v původním jazyce
Recently, a great number of smart devices associated with their users exist within Smart City. Users are constantly moving around within Smart City according to their plans and consequently receive various network services from hosting devices adjacent.Currently, there are numbers of different types of security algorithms related to those activities; moreover, under such complexity of digital environment including various network devices and users, selective and customised services need to be providedfor suitable purposes. However, the provided services are to be secured and well protected. Each customised service usually keeps tailored security policy and algorithm. Conventionally, every service including different servers, network, and users employs the same security algorithm so that sensitive information could be traced and revealed by using counter tracing method. Therefore, this paper investigates tailored smart security algorithm, which is taking into account scenarios within
Název v anglickém jazyce
A Study on the Security Algorithm for Contexts in Smart Cities
Popis výsledku anglicky
Recently, a great number of smart devices associated with their users exist within Smart City. Users are constantly moving around within Smart City according to their plans and consequently receive various network services from hosting devices adjacent.Currently, there are numbers of different types of security algorithms related to those activities; moreover, under such complexity of digital environment including various network devices and users, selective and customised services need to be providedfor suitable purposes. However, the provided services are to be secured and well protected. Each customised service usually keeps tailored security policy and algorithm. Conventionally, every service including different servers, network, and users employs the same security algorithm so that sensitive information could be traced and revealed by using counter tracing method. Therefore, this paper investigates tailored smart security algorithm, which is taking into account scenarios within
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Ostatní
Rok uplatnění
2014
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
International Journal of Distributed Sensor Networks
ISSN
1550-1329
e-ISSN
—
Svazek periodika
2014
Číslo periodika v rámci svazku
2014
Stát vydavatele periodika
US - Spojené státy americké
Počet stran výsledku
8
Strana od-do
102051-102058
Kód UT WoS článku
000338058800001
EID výsledku v databázi Scopus
—