购买
下载掌阅APP,畅读海量书库
立即打开
畅读海量书库
扫码下载掌阅APP

参考文献

[1]CloudFlare. What is edge computing [EB/OL]. [2022-10-1]. https://www.cloudflare.com/learning/serverless/glossary/what-is-edge-computing.

[2]Karim Arabi. Trends, Opportunities and Challenges Driving Architecture and Design of Next Generation Mobile Computing and IoT Devices [R/OL]. [2015-9-9]. https://www.mtl.mit.edu/events-seminars/seminars/trends-opportunities-and-challenges-driving-architecture-and-design-next.

[3]ECC, AII. 边缘计算参考架构3. 0 [R/OL]. [2018-11]. http://www.ecconsortium.net/Uploads/file/20190225/1551059767474697.pdf.

[4]REN J, GUO H, XU C, et al. Serving at the edge: A scalable IoT architecture based on transparent computing [J]. IEEE Network, 2017, 31: 96-105.

[5]EdgeX Foundry. EdgeX platform architechure [EB/OL]. [2022-11-1]. https://www.edgexfoundry.org/why-edgex.

[6]Iotworld. Value, opportunities, and challenges of edge computing that will be popular in 2017 [R/OL]. [2017-01-19]. http://www.iotworld.com.cn/html/News/201701/8122ed7f43e02c1f.shtm.

[7]ZHANG L, AFANASYEV A, BURKE J, et al. Named data networking [J]. ACM SIGCOMM Computer Communication Review, 2014, 44 (3): 66-73.

[8]WANG S G, XU W X, WU D, et al. A fast RDMA offload method for unreliable interconnection networks [J]. Journal of Hunan University (Natural Sciences), 2015, 42: 100-107.

[9]ISMAIL B I, GOORTANI E M, KARIM M B A, et al. Evaluation of Docker as Edge computing platform [C]//2015 IEEE Conference on Open Systems (ICOS). New York: IEEE, 2015.

[10]NAM Y, CHOI Y, YOO B, et al. EdgeIso: Effective Performance Isolation for Edge Devices [C]//2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS). New York: IEEE, 2020: 295-305.

[11]YI S, QIN Z, LI Q. Security and privacy issues of fog computing: A survey [C]//Proc of Int Conf on Wireless Algorithms, Systems, and Applications. Berlin: Springer, 2015: 685-695.

[12]SABT M, ACHEMLAL M, BOUABDALLAH A. Trusted execution environment: what it is, and what it is not [C]//2015 IEEE Trustcom/BigDataSE/ISPA. New York: IEEE, 2015: 57-64.

[13]WANG Y, LIU L, SU C, et al. CryptSQLite: Protecting data confidentiality of SQLite with intel SGX [C]//2017 International Conference on Networking and Network Applications (NaNA). New York: IEEE, 2017: 303-308.

[14]Karbhari P, Rabinovich M, Xiao Z, et al. ACDN: A content delivery network for applications [C]//Proceedings of the 2002 ACM SIGMOD international conference on Management of data. New York: ACM SIGMOD, 2002: 619.

[15]PHAM Q V, FANG F, HA V N, et al. A survey of multi-access edge computing in 5G and beyond: Fundamentals, technology integration, and state-of-the-art [J]. IEEE Access, 2020, 8: 116974-117017.

[16]IEEE, ACM. The first IEEE/ACM symposium on edge computing [EB/OL]. [2018-11-05]. https://acm-ieee-sec.org/2016.

[17]ECC. Edge Computing Consortium. [EB/OL]. [2018-11-03]. http://www.ecconsortium.org. XN18IEhK2ZAGqAZTZrGU7LIeibKR3oLHgzYXq/9JKGzq2+Zk4srNWEOgOmdXkxkE

点击中间区域
呼出菜单
上一章
目录
下一章
×