Вы находитесь на странице: 1из 2

[1] L. Atzori, A. Iera, and G.

Morabito, “The Internet of Things: A Survey,”


Comput. networks, vol. 54, no. 15, pp. 2787–2805, 2010.
[2] D. Henning, “Tackling ISO 27001: A Project to Build an ISMS,” 2009.
[3] B. Duncan, “FAST-CCS: Finding a Solution to Cloud Cyber Security,” in The
Eighth International Conference on Cloud Computing, GRIDs, and Virtualization,
2017, pp. 1–3.
[4] A. Kantee, “The Rise and Fall of the Operating System,” Login:, pp. 6–9, 2015.
[5] C. Lennox, P. Lisowsky, and J. Pittman, “Tax Aggressiveness and Accounting
Fraud,” J. Account. Res., vol. 51, no. 0, pp. 739–778, 2013.
[6] C. Chang and M. Ramachandran, “Towards Achieving Data Security with the Cloud
Computing Adoption Framework,” IEEE Trans. Serv. Comput., vol. 9, no. 1, pp. 138–
151, 2016.
[7] T. F. J. Pasquier, J. Singh, J. Bacon, and D. Eyers, “Information Flow Audit
for PaaS Clouds,” 2013.
[8] B. Duncan and M. Whittington, “Cyber Security for Cloud and the Internet of
Things: How Can it be Achieved?,” Forthcom. IET, pp. 1–20, 2017.
[9] L. Da Xu, S. Member, W. He, and S. Li, “Internet of Things in Industries : A
Survey Internet of Things in Industries : A Survey,” IEEE Trans. Ind. Informatics,
vol. 10, no. November, pp. 2233–2243, 2014.
[10] V. Chang and M. Ramachandran, “Towards Achieving Data Security with the Cloud
Computing Adoption Framework,” IEEE Trans. Serv. Comput., vol. 9, no. 1, pp. 138–
151, 2016.
[11] F. Tao, L. Zhang, V. C. Venkatesh, Y. Luo, and Y. Cheng, “Cloud manufacturing:
a computing and service-oriented manufacturing model,” Proc. Inst. Mech. Eng. Part
B J. Eng. Manuf., vol. 225, no. 10, pp. 1969–1976, 2011.
[12] M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker, DDoS
defense by offense, vol. 28, no. 1. 2010.
[13] T. Fresh, A. States, and G. C. Council, “Call for contributions,” 2016.
[14] T. F. J. M. Pasquier, J. Singh, and J. Bacon, “Information Flow Control for
Strong Protection with Flexible Sharing in PaaS,” Proc. - 2015 IEEE Int. Conf.
Cloud Eng. IC2E 2015, pp. 279–282, 2015.
[15] B. Duncan, A. Happe, and A. Bratterud, “Cloud Cyber Security: Finding an
Effective Approach with Unikernels,” in Advances in Security in Computing and
Communications, J. Sen, Ed. InTech, 2017, p. Chapter 2.
[16] D. Larson and V. Chang, “A Review and Future Direction of Agile, Business
Intelligence, Analytics and Data Science,” Int. J. Inf. Manage., pp. 1–25, 2016.
[17] T. Lorünser, Andreas Happe, and D. Slamanig, “ARCHISTAR: Towards Secure and
Robust Cloud Based Data Sharing,” IEEE 7th Int. Conf. Cloud Comput. Technol. Sci.
CloudCom 2015, Vancouver, Novemb. 30 - December 3, pp. 371–378, 2015.
[18] J. A. Chaula, “A Socio-Technical Analysis of Information Systems Security
Assurance: A Case Study for Effective Assurance,” 2006.
[19] V. Chang, R. Newman, R. J. Walters, and G. B. Wills, “Review of Economic
Bubbles,” 2014.
[20] J. Singh and J. M. Bacon, “On middleware for emerging health services,” J.
Internet Serv. Appl., vol. 5, no. 1, p. 6, 2014.
[21] D. C. Langevoort, “The SEC and the Madoff Scandal: Three Narratives in Search
of a Story,” Financ. World, no. 1475433, 2009.
[22] T. Pasquier, J. Singh, D. Eyers, and J. Bacon, “CamFlow: Managed Data-sharing
for Cloud Services,” IEEE Trans. Cloud Comput., no. JUNE, pp. 1–1, 2015.
[23] I. Bojanova, G. Hurlburt, and J. Voas, “Imagineering an internet of anything,”
Computer (Long. Beach. Calif)., vol. 47, no. 6, pp. 72–77, 2014.
[24] Verizon, “Verizon Security Breach Report 2017,” 2017.
[25] J. Singh, T. F. J. M. Pasquier, and J. Bacon, “Securing tags to control
information flows within the Internet of Things,” 2015 Int. Conf. Recent Adv.
Internet Things, RIoT 2015, 2015.
[26] K. Krukow, “Towards a theory of trust for the global ubiquitous computer,”
Brics.Dk, 2006.
[27] M. Creeger, “Distributed Computing CTO Roundtable: Cloud Computing,” Distrib.
Comput., vol. 7, no. 5, pp. 1–18, 2009.
[28] M. Coppock, “New ‘BrickerBot’ malware attack kills unsecured Internet of
Things devices,” Web page, 2017. [Online]. Available:
http://www.digitaltrends.com/computing/brickerbot-malware-targets-iot-with-pdos-
attacks/. [Accessed: 14-Apr-2017].
[29] G. Sachs, “The Internet of Things: Making sense of the next mega-trend,” 2014.
[30] BIIntelligence, “Here’s how the Internet of Things will explode by 2020,”
2016. [Online]. Available: http://www.businessinsider.com/iot-ecosystem-internet-
of-things-forecasts-and-business-opportunities-2016-2?IR=T. [Accessed: 01-Jan-
2016].
[31] EMC, “Discover the Digital Universe of Opportunities: Rich Data and the
Increasing Value of the Internet of Things,” 2014. [Online]. Available:
http://www.emc.com/leadership/digital-universe/index.htm?pid=landing-
digitaluniverse-131212. [Accessed: 01-Jan-2016].
[32] J. Research, “‘Internet of Things’ Connected Devices to Almost Triple to over
38 Billion Units by 2020,” 2016. [Online]. Available:
http://www.juniperresearch.com/press/press-releases/iot-connected-devices-to-
triple-to-38-bn-by-2020. [Accessed: 01-Jan-2016].
[33] J. Gubbi, R. Buyya, and S. Marusic, “1207.0203,” Futur. Gener. Comput. Syst.,
vol. 29, no. 1, pp. 1–19, 2013.
[34] S. Sharma, V. Chang, U. S. Tim, J. Wong, and S. Gadia, “Cloud-based emerging
services systems,” Int. J. Inf. Manage., pp. 1–19, 2016.
[35] J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, “Twenty Security
Considerations for Cloud-Supported Internet of Things,” IEEE Internet Things J.,
vol. 3, no. 3, pp. 269–284, 2016.
[36] A. Zanella, S. Member, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi,
“Internet of Things for Smart Cities,” IEEE Internet things, vol. 1, no. 1, 2014.
[37] D. Evans, “The Internet of Things - How the Next Evolution of the Internet is
Changing Everything,” CISCO white Pap., no. April, pp. 1–11, 2011.
[38] T. F. J. Pasquier, J. Singh, J. Bacon, and O. Hermant, “Managing Big Data with
Information Flow Control,” in Cloud Computing Technology and Science (CloudCom),
2015 IEEE 7th International Conference, 2015, vol. 2, pp. 1–8.
[39] J. Singh, “The role of reconfigurable , policy-based middleware in supporting
the Internet of Things,” vol. 3, no. 1, p. 2015, 2015.
[40] S. Kumbhar, “Critical role for the Internet of Things in wastewater,” iot-
now.com, 2016. [Online]. Available: https://www.iot-now.com/2016/08/22/51418-
critical-role-for-the-internet-of-things-in-wastewater/#more-51418. [Accessed: 12-
Apr-2017].
[41] R. Pavlicek, “Unikernel-based microservices will transform the cloud for the
IoT age,” 2016. [Online]. Available: http://techbeacon.com/unikernel-based-
microservices-will-transform-cloud-iot-age.
[42] W. Hurst, N. Shone, A. El Rhalibi, A. Happe, B. Kotze, and B. Duncan,
“Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education,” in
Cloud Computing 2017: The Eighth International Conference on Cloud Computing,
GRIDs, and Virtualization, 2017, pp. 1–6.
[43] OWASP, “OWASP Top 10 IoT Vulnerabilities (2014),” 2014. [Online]. Available:
https://www.owasp.org/index.php/Top_10_IoT_Vulnerabilities_(2014). [Accessed: 07-
Jul-2016].
[44] K. L. Lueth, “Current state of the 360+ IoT Platforms,” 2016. [Online].
Available: https://iot-analytics.com/current-state-of-iot-platforms-2016/.
[Accessed: 07-Jul-2016].
[45] B. Duncan, A. Happe, and A. Bratterud, “Enterprise IoT Security and
Scalability: How Unikernels can Improve the Status Quo,” in 9th IEEE/ACM
International Conference on Utility and Cloud Computing (UCC 2016), 2016, pp. 1–6.
[46] OWASP, “OWASP IoT Security Guidance,” 2016. [Online]. Available:
https://www.owasp.org/index.php/IoT_Security_Guidance. [Accessed: 07-Jul-2016].
[47] CBR, “IoT security breach forces kitchen devices to reject junk food,”
CBROnline, 2015. [Online]. Available: http://www.cbronline.com/news/internet-of-
things/consumer/iot-security-breach-forces-kitchen-devices-to-reject-junk-food-
4544884. [Accessed: 01-Jan-2016].