A
Application Binary Interface (ABI),
37
Attribute Authority (AA),
199
Attribute Based Data Storage (ABDS),
208
Attribute Provider (AP),
186
Attribute-Based Access Control (ABAC),
181
Attribute-Based Encryption (ABE),
181
Attribute-Based Signature (ABS),
185
Augmented Reality (AR),
92
Automated Identification Data Carriers (AIDC),
157
B
Boundary Input Value (BIV),
111
Branch-and-Bound based Application Partitioning (BBAP),
116
Bring Your Own Device (BYOD),
55
Bring Your Own PC (BYOPC),
55
Bring Your Own Phone (BYOP),
55
Bring Your Own Technology (BYOT),
55
Broad network access,
C
Ciphertext-Policy ABE (CP-ABE),
187
Community cloud,
Comparable Attribute-Based Encryption,
185
Cyber Virtual System (CVS),
91
D
Data Encrypting Key (DEK),
183,
185
Data Encryption Key (DEK),
206
Decentralized Governance,
162
Decision Module (DM),
184
Decryption Service Provider (DSP),
206
Device Tree Blob (DTB),
219
Directed Acyclic Graph (DAG),
22
E
Encryption Service Provider (ESP),
206
Enterprise Service Buse (ESB),
159
Extensible Markup Language (XML),
186
F
G
Generic Routing Encapsulation (GRE),
60
H
Hardware Abstraction Layer (HAL),
39
Hybrid cloud,
I
Identity Provider (IdP),
186
Identity-Based Encryption (IBE),
187
Industry Specification Group (ISG),
63
Information-Centric Networking (ICN),
151,
181,
191
Infrastructure as a Service (IaaS),
Instruction Set Architecture (ISA),
37
Internet of Everything (IoE),
157
Internet of Things (IoT),
19,
82
Internet Protocol (IP),
63
J
JavaScript Object Notation (JSON),
186
K
Key Policy ABE (KP-ABE),
187
L
Layer 2 Tunneling Protocols (L2TP),
59
Location-Based Service (LBS),
79,
188
Logical Volume Manager (LVM),
233
M
Measured service,
Min-Cut based Greedy Application Partitioning (MCGAP),
116
Mobile as a Service Broker (MaaSB),
81
Mobile as a Service Consumer (MaaSC),
76
Mobile as a Service Provider (MaaSP),
78
Mobile Augmentation Cloud Services (MACS),
115
Mobile Cloud Computing (MCC),
11
Mobile-as-a-Representer (MaaR),
95
Multi-authority Attributes Management,
186
N
National Institute of Standards and Technology (NIST),
Network Function Virtualization (NFV),
57,
62,
220
Network Virtualization (NV),
57
Networking as a Service (NaaS),
230
O
Object Oriented Programming (OOP),
84
Object Relation Graph (ORG),
116
On-demand self-service,
Open Identity Exchange (OIX),
186
Open Virtual Switch (OVS),
215
P
Partitioning CP-ABE (P-CP-ABE),
206
Plain Old Java Interfaces (POJI),
52
Plain Old Java Objects (POJO),
52
Platform as a Service (PaaS),
Point-to-Point Protocol (PPP),
59
Private cloud,
Private Key Generator (PKG),
189
Provisioning Functions (PFs),
93
Public cloud,
Q
R
Radio Frequency (RF),
124
Rapid elasticity,
Remote Procedure Call (RPC),
84
Representational StateTransfer (REST),
27
Resource Description Framework (RDF),
173
Resource pooling,
Role-Based Access Control (RBAC),
189
S
Secure Socket Layer (SSL),
60
Security Assertion Markup Language (SAML),
186
Service Level Agreement (SLA),
170
Service Oriented Architecture (SOA),
159
Simple Object Access Protocol (SOAP),
161
Simple Storage Service (S3),
67
Single-Sign-On (SSO),
85,
172
Software as a Service (SaaS),
Software-Defined Networking (SDN),
57,
61,
215
Storage Area Network (SAN),
63
Storage Service Provider (SSP),
206
T
Trusted Authority (TA),
189
Trusted Third Party (TTP),
194
U
V
Vehicle-to-Vehicle (V2V),
175
Virtual eXtensible LAN (VXLAN),
60
Virtual Local Area Networks (VLAN),
60
Virtual Private LAN Services (VPLS),
58
Virtualized Network Function (VNF),
62
Virual representation,
95
VXLAN tunnel endpoints (VTEPs),
60
W
Web Ontology Language (OWL),
196
X
Y
Z