Edge Computing Cybersecurity Standards: Protecting Infrastructure and Applications
The advent of MEC (Multi-access Edge Computing), as a natural evolution of cloud computing, can enable innovative services and applications, with many opportunities for end users. Hosting applications at the edge could also address privacy and security issues inherent to the traditional cloud-based...
Saved in:
Main Authors: | Dario Sabella, Kishen Maloor, Ned Smith, Michaela Vanderveen, Akis Kourtis |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10767241/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Survey on rail transit mobile edge computing network security
by: Renchao XIE, et al.
Published: (2023-04-01) -
Handover decision with multi-access edge computing in 6G networks: A survey
by: Saeid Jahandar, et al.
Published: (2025-03-01) -
Cloud native based edge computing: vision and challenges
by: Deze ZENG, et al.
Published: (2021-06-01) -
5G edge computing technology and application prospects
by: Hongyuan MA, et al.
Published: (2019-06-01) -
Research on application of edge computing system based on KubeEdge
by: Hang ZHAO, et al.
Published: (2022-03-01)