참고문헌
- S. C. Lee & W. Y. Chung. (2014). A robust wearable u-healthcare platform in wireless sensor network. Journal of Communications and Networks, 16(4), 465-474. DOI : 10.1109/jcn.2014.000077
- T. W. Kim, K. H. Park, S. H. Yi & H. C. Kim. (2014, June). A Big Data Framework for u-Healthcare Systems Utilizing Vital Signs. Proceedings of the 2014 International Symposium on Computer, Consumer and Control(IS3C). (pp. 494-497). DOI : 10.1109/is3c.2014.135
- F. Touati, R. Tabish & A. Ben Mnaouer. (2014, April). Towards u-health: An indoor 6LoWPAN based platform for real-time healthcare monitoring. Proceedings of the 2013 6th Joint IFIP Wireless and Mobile Networking Conference(WMNC). (pp. 1-4).
- Y. S. Lee, N. Bruce, T. Non, E. Alasaarela & H. Lee. (2015, March). Hybrid Cloud Service Based Healthcare Solutions. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). (pp. 25-30).
- A. Singh & K. Chatterjee. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115. https://doi.org/10.1016/j.jnca.2016.11.027
- S. Singh, Y. S. Jeong & J. H. Park. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200-222. DOI : 10.1016/j.jnca.2016.09.002
- J. Zhang, H. Huang & X. Wang. (2016). Resource provision algorithms in cloud computing: A survey. Journal of Network and Computer Applications, 64, 23-42. https://doi.org/10.1016/j.jnca.2015.12.018
- V. Varadharajan & U. Tupakula. (2014). Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11(1), 60-75. DOI : 10.1109/tnsm.2014.041614.120394
- A. Iera, G. Morabito & L. Atzori. (2016). The internet of things moves into the cloud. Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). (pp. 191-191). DOI : 10.1109/ic2ew.2016.54
- H. N. Saha, A. Mandal & A. Sinha. (2017). Recent trends in the internet of things. Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). (pp. 1-4). DOI : 10.1109/ccwc.2017.7868439
- A. Celesti, D. Mulfari, M. Fazio, M. Villari & A. Puliafito. (2016). Exploring container virtualization in iot clouds. Proceedings of the 2016 IEEE International Conference on Smart Computing (SMARTCOMP). (pp. 1-6). DOI : 10.1109/smartcomp.2016.7501691
- K. S. Dar, A. Taherkordi & F. Eliassen. (2016). Enhancing dependability of cloud-based iot services through virtualization. Proceedings of the 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 2016. (pp. 106-116). DOI : 10.1109/iotdi.2015.38
- L. Echenauer & V. D. Gligor. (2002, Nov). A Key-Management scheme for Distributed sensor networks. Proceedings of the 9th ACM conference on Computer and communications security. (pp. 41-47).
- H. Chan, A. Perrig & D. Song. (2003, May). Random key predistribution schemes for Sensor networks. Proceedings of the 2003 IEEE Symposium on Security and Privacy. (pp. 197-213). DOI : 10.1109/secpri.2003.1199337
- S. Zhu, S. Setia & S. Jajodia. (2002). A distributed group key managemet protocol for ad hoc networks. Unpublished manuscript. George Mason University.
- A. Khalili, J. Katz & W. A. Arbaugh. (2003, Jan). Toward Secure key Distribution in Truly Ad-Hoc Networks. Proceedings of the 2003 Symposium on Applications and the Internet Workshops(SAINT'03 Workshops). (pp. 342-346). DOI : 10.1109/saintw.2003.1210183