Security Issues of Mobile Application Using Cloud Computing
暂无分享,去创建一个
[1] Mário M. Freire,et al. Security issues in cloud environments: a survey , 2014, International Journal of Information Security.
[2] Dongho Won,et al. Security Issues and Threats According to the Attribute of Cloud Computing , 2012 .
[3] Úlfar Erlingsson,et al. Engineering Secure Software and Systems , 2011, Lecture Notes in Computer Science.
[4] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[5] Haralambos Mouratidis,et al. A framework to support selection of cloud providers based on security and privacy requirements , 2013, J. Syst. Softw..
[6] Monica Borda,et al. Secure Mobile-Cloud Framework - Implementation on the Mobile Device , 2013 .
[7] Tereza Otcenásková,et al. A proposal for a computer-based framework of support for public health in the management of biological incidents: the Czech Republic experience , 2012, Perspectives in public health.
[8] Jia Weihua,et al. Research on the Security Issues of Cloud Computing , 2013 .
[9] Mukesh Singhal,et al. Collaboration in multicloud computing environments: Framework and security issues , 2013, Computer.
[10] Jonathan Wood,et al. Authentication, Authorization and Accounting (AAA) Transport Profile , 2003, RFC.
[11] Zhenyu Du,et al. Intelligence Computation and Evolutionary Computation , 2013 .
[12] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.
[13] G. Padmavathi,et al. Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism , 2012 .
[14] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[15] Federico Mancini,et al. Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings , 2012, ESSoS.
[16] Tai-hoon Kim,et al. Computer Applications for Security, Control and System Engineering , 2012, Communications in Computer and Information Science.
[17] Minho Kim,et al. A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security , 2012 .