A fast and scalable approach for IoT service selection based on a physical service model

X Jin, S Chun, J Jung, KH Lee - Information Systems Frontiers, 2017 - Springer
Abstract Information Systems (ISs) have become one of the crucial tools for various
organizations in managing and coordinating business processes. Now we are entering the …

IoT service selection based on physical service model and absolute dominance relationship

X Jin, S Chun, J Jung, KH Lee - 2014 IEEE 7th International …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) is a paradigm where real-world entities can be connected to the
Internet and provide services with the help of attached devices. With the development of IoT …

Privacy and security issues in IoT healthcare applications for the disabled users a survey

W AL-mawee - 2012 - scholarworks.wmich.edu
Aging of the population resulted in new challenges for the society and healthcare systems.
Ambient Assisted Living (AAL) that depends on Internet of Things (IoT) provides assistance …

Security and privacy issues in IoT healthcare application for disabled users in developing economies

K Assa-Agyei, F Olajide, A Lotfi - Journal of Internet Technology and …, 2022 - irep.ntu.ac.uk
In this paper, we explore the security and privacy issues of Internet of Things (IoT)
healthcare applications for special needs users. IoT enables health-related organizations to …

[PDF][PDF] A cloud based conceptual identity management model for secured Internet of Things operation

A Bello, V Mahadevan - Journal of Cyber Security and …, 2019 - journals.riverpublishers.com
An era ago, projecting artificial intelligence as the pillar of next-generation technology would
have been technically difficult. Today, machines are getting smarter, sparking a new wave of …

Automated mashup of CoAP services on the Internet of Things

X Jin, K Hur, S Chun, M Kim… - 2015 IEEE 2nd World …, 2015 - ieeexplore.ieee.org
The Constrained Application Protocol (CoAP) is a specialized Web transfer protocol for use
with constrained devices and networks in the Internet of Things (IoT). Although a single …

[HTML][HTML] 2 Security Analysis of IoT

A Bello, V Mahadevan - journals.riverpublishers.com
IoT claims many benefits such as flexibility, comfort, and efficiency [20]. However, it also has
a great potential for disaster if security issues are not highly prioritised. The generic …

The interpretation of fuzzy reasoning in operator fuzzy logic

XH Liu, KY Fang, JP Tsai - Proceedings The Nineteenth International …, 1989 - computer.org
Abstract The Constrained Application Protocol (CoAP) is a specialized Web transfer protocol
for use with constrained devices and networks in the Internet of Things (IoT). Although a …