2012 Fourth International Conference on Multimedia Information Networking and Security 2012
DOI: 10.1109/mines.2012.255
|View full text |Cite
|
Sign up to set email alerts
|

Security Structure Study of City Management Platform Based on Cloud Computing under the Conception of Smart City

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Applications that can be improved by the integration of IoT into cloud computing are many; such as pervasive healthcare [4], smart homes [5], smart cities [6], and future transportation systems [7]. Furthermore, public safety in smart city management can be efficiently addressed by taking advantage of cloud and IoT integration [8]- [10]. In a cloud-centric IoT framework, sensors provide their sensed data to a storage cloud as a service, which then undergoes data analytics and data mining tools for information retrieval and knowledge discovery.…”
Section: Introductionmentioning
confidence: 99%
“…Applications that can be improved by the integration of IoT into cloud computing are many; such as pervasive healthcare [4], smart homes [5], smart cities [6], and future transportation systems [7]. Furthermore, public safety in smart city management can be efficiently addressed by taking advantage of cloud and IoT integration [8]- [10]. In a cloud-centric IoT framework, sensors provide their sensed data to a storage cloud as a service, which then undergoes data analytics and data mining tools for information retrieval and knowledge discovery.…”
Section: Introductionmentioning
confidence: 99%
“…A broad source of city administration is a conservative platform, some of which is important information on national security and benefits. As a result, information resource protection systems develop legitimate users of information security and operations [22].…”
Section: Related Workmentioning
confidence: 99%
“…Threats to the critical infrastructure could have devastating results on national security, the economy and citizens. Information security and privacy maturity must be taken to new levels before IoT and sensors can be deployed on a larger scale (Sicari et al, 2015;Bekara, 2014;Gubbi et al, 2013;Li et al, 2012;Marias et al, 2011;Kitchin, 2014;Ruiz-Romero et al, 2014;Martinez-Balleste et al, 2013;Elmaghraby and Losavio, 2014).…”
Section: Organisational Performancementioning
confidence: 99%