An endogenous security protection framework adapted to 5G MEC in power industry

H Xuesong, L Wei, Z Tao, H Haidong… - 2021 China …, 2021 - ieeexplore.ieee.org
The power industry has a large number of 5G communication requirements, especially on
the side of the distribution communication network. There are many points and a large …

[PDF][PDF] MEC deployments in 4G and evolution towards 5G

F Giust, G Verin, K Antevski, J Chou, Y Fang… - ETSI White …, 2018 - athonet.com
Multi-access Edge Computing is regarded as a key technology to bring application-oriented
capabilities into the heart of a carrier's network, in order to explore a wide range of new use …

Physical Layer Security Based Enabling Technologies for 6G Communications Values

E Jorswieck, PH Lin, C Janda - 2022 IEEE Future Networks …, 2022 - ieeexplore.ieee.org
Novel security primitives built on physical layer parameters gain interest for the design of the
wireless 6G networks. Regarding key value indicators (KVI), the requirements for future 6G …

[PDF][PDF] A proposed solution to secure MCC uprising issue and challenges in the domain of cyber security

MS Vittapu, V Sunkari, AY Abate… - Open Journal of Mobile …, 2015 - academia.edu
The development of cloud computing and mobility, mobile cloud computing has emerged
and become a focus of research. By the means of on-demand self-service and extendibility …

Mobile device security considerations for small-and medium-sized enterprise business mobility

M A. Harris, K P. Patten - Information Management & Computer …, 2014 - emerald.com
Purpose–This paper's purpose is to identify and accentuate the dilemma faced by small-to
medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business …

M2M security: Challenges and solutions

A Barki, A Bouabdallah, S Gharout… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of
attention in both industrial and academic sectors, and which is expected to grow in the next …

[PDF][PDF] MEC security: Status of standards support and future evolutions

D Sabella, A Reznik, KR Nayak, D Lopez, F Li… - ETSI white …, 2021 - researchgate.net
Executive Summary The present White Paper will focus on MEC (Multi-access Edge
Computing) technologies and intends to explore security-related use cases and …

Serverless service architectures and security minimals

N Mateus-Coelho, M Cruz-Cunha - 2022 10th International …, 2022 - ieeexplore.ieee.org
The Serverless subject is an emerging new world within technology scope. Although it
seems to be by name a specific and a circumscriptive topic, it is a vast and complex subject …

[PDF][PDF] Mobile platform security

C Gehrmann, P Ståhl - Ericsson review, 2006 - Citeseer
The term security lacks meaning until one has defined what is to be secure and for whom.
Likewise, security is difficult to comprehend without a potential threat. Mobile phones for …

Open access to intersystem handover control using multi-access edge computing

E Pencheva, D Kireva, I Atanasov… - 2018 International …, 2018 - ieeexplore.ieee.org
Multi-access Edge Computing (MEC) is a cloud technology that places storage and
computing resources at the edge of the mobile network. The MEC platform provides services …