Boussard et al., 2013 - Google Patents
A process for generating concrete architecturesBoussard et al., 2013
View HTML- Document ID
- 17612151000590991212
- Author
- Boussard M
- Meissner S
- Nettsträter A
- Olivereau A
- Segura A
- Thoma M
- Walewski J
- Publication year
- Publication venue
- Enabling Things to Talk: Designing IoT Solutions with the IoT Architectural Reference Model
External Links
Snippet
This chapter addresses the question of how to generate concrete architectures with the IoT ARM, which is one of the many uses to which an architectural reference model can be put (see Chaps. 3 and 4). This topic was already touched upon in Section “Generation of …
- 238000000034 method 0 title abstract description 104
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/4421—Execution paradigms
- G06F9/4428—Object-oriented
- G06F9/443—Object-oriented method invocation or resolution
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7571353B2 (en) | Internet of Things | |
| Ali et al. | Applications of blockchains in the Internet of Things: A comprehensive survey | |
| Song et al. | A supply-chain system framework based on internet of things using blockchain technology | |
| Rawat et al. | Smart cities cybersecurity and privacy | |
| Misra et al. | Securing the internet of things | |
| Jung et al. | A survey of security issue in multi-agent systems | |
| US12282575B2 (en) | Dynamic resolution and enforcement of data compliance | |
| Wickström et al. | Smart contract based distributed IoT security: A protocol for autonomous device management | |
| Tragos et al. | Designing secure iot architectures for smart city applications | |
| Barati et al. | Privacy‐aware cloud ecosystems: Architecture and performance | |
| Zeydan et al. | A trustworthy framework for multi-cloud service management: Self-sovereign identity integration | |
| Prithi et al. | Trust management framework for handling security issues in multi-cloud environment | |
| Roy et al. | BloAC: A blockchain-based secure access control management for the Internet of Things | |
| Boussard et al. | A process for generating concrete architectures | |
| Reniers et al. | Authenticated and auditable data sharing via smart contract | |
| de Aguiar Monteiro et al. | A survey on microservice security–trends in architecture privacy and standardization on cloud computing environments | |
| Adamski et al. | Trust and security in grids: A state of the art | |
| Suciu et al. | Lego methodology approach for common criteria certification of IoT telemetry | |
| Tran et al. | An Experience Report on the Design and Implementation of an Ad-hoc Blockchain Platform for Tactical Edge Applications | |
| Jurnet Bolarin | Control resilience in a F2C scenario | |
| Stodt et al. | Distributed zero trust architecture based on policy negotiation secured by DPP in blockchain | |
| Kurni et al. | Securing IoT through Blockchain in Big Data Environment | |
| Rizzardi | Security in Internet of Things: networked smart objects. | |
| Kurni et al. | Securing IoT through 7 Blockchain in Big | |
| Bouleghlimat | Security Requirements for Outsourced Big Data in a Cloud Environment |