References: [1] Chen, Y., Ruchenbusch, L. (2016). Mobile Edge Computing: Brings the Value Back to Networks, IEEE Software Defined Networks, Newsletter, March 2016, Available at: http://sdn.ieee.org/newsletter/march-2016/mobile-edgecomputing-bringthe- values-back-to-networks [2] Roman, R., Lopez, J., Mambo, M. (2016). Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges”, Future Generation Computer Systems, 2016, Available at: https://arxiv.org/pdf/1602.00484.pdf [3] Beck, M. T., Feld, S., Linnhhoff-Popien, C., Pützschler, U. (2016). Mobile Edge Computing, Informatik-Spektrum, vol. 39, issue 2, pp. 108-114, 2016. [4] Sarria, D., Park, D., Jo, M. (2016). Recovery for Overloaded Mobile Edge Computing, Future Generation Computer Systems, 2016, http://dx.doi.org/10.10.2016/j.future.2016.06.024 [5] Beck, M., Werner, M., Feld, S., Schimper, T. (2014). Mobile Edge Computing: A Taxonomy, 2014, The Sixth International Conference on Advances in Future Internet, IARIA, Available at:http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.670.9418&rep=rep1&type=pdf [6] Ahmed, A., Ahmed, E. (2016). A Survey on Mobile Edge Computing, In: 10th IEEE International Conference on Intelligent Systems and Control (ISCO 2016), 2016, p 1-8. [7] ETSI GS MEC 003, Mobile Edge Computing (MEC); Framework and Reference Architecture, v1.1.1, 2016. [8] ETSI GS MEC 002 Mobile Edge Computing (MEC); Technical Requirements, v1.1.1, 2016. [9] Nordbotten, N. A. (2009). XML and Web Services Security Standards, in IEEE Communications Surveys & Tutorials, 11 (3), p 4-21, 3rd Quarter 2009. [10] Cheong, C. P., Chatwin, C., Young, R. (2011). A New Secure Token for Enhancing Web Service Security, 2011 IEEE International Conference on Computer Science and Automation Engineering, Shanghai, 2011, p 45-48. |