A distributed mobile cloud computing model for secure big data
暂无分享,去创建一个
[1] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[2] D. Popa,et al. A security framework for mobile cloud applications , 2013, 2013 11th RoEduNet International Conference.
[3] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[4] Pieter H. Hartel,et al. Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.
[5] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[6] Kaoru Kurosawa,et al. UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.
[7] Carl A. Gunter,et al. Dynamic Searchable Encryption via Blind Storage , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Peter Kulchyski. and , 2015 .
[9] Melissa Chase,et al. Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..
[10] Jae-Cheol Ryou,et al. Mobile Cloud Computing System Using Self-Proxy Server , 2015 .
[11] O. KuyoroS.,et al. Cloud computing security issues and challenges , 2011 .
[12] John C. Grundy,et al. An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.
[13] Md. Shahadat Hossain,et al. Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[14] Pooja A. Uplenchwar,et al. Data Security in Unreliable Cloud Using Access Control and Access Time , 2013 .
[15] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[16] Chun-Jung Chen,et al. Information security issue of enterprises adopting the application of cloud computing , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.