2021
DOI: 10.1007/978-3-030-71906-7_17
|View full text |Cite
|
Sign up to set email alerts
|

FogProtect: Protecting Sensitive Data in the Computing Continuum

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…If M is better than the best solution in regard to a specific comparison metric, the best solution is replaced by M , the path to the best solution is stored, and the comparison ends (line [12][13][14][15][16]. The comparison also ends if M is worse than the best solution (line [17][18][19]. It is important to state that the amount of PCP instances will always be the first metric that will be used for comparison (line 9).…”
Section: B Algorithmic Improvementsmentioning
confidence: 99%
See 1 more Smart Citation
“…If M is better than the best solution in regard to a specific comparison metric, the best solution is replaced by M , the path to the best solution is stored, and the comparison ends (line [12][13][14][15][16]. The comparison also ends if M is worse than the best solution (line [17][18][19]. It is important to state that the amount of PCP instances will always be the first metric that will be used for comparison (line 9).…”
Section: B Algorithmic Improvementsmentioning
confidence: 99%
“…In this paper, we present a data protection focused adaptation engine that leverages the applicationand infrastructure based adaptation space of a distributed VAP. The engine employs an extended system model and adaptation rules that are based on previous research which was conducted within a collaborative H2020 project [19], namely FogProtect 1 . The motivating use case also stems from a real problem scenario by one of the projects partners.…”
Section: Introductionmentioning
confidence: 99%