PiMiCo: Privacy Preservation via Migration in Collaborative Mobile Clouds
暂无分享,去创建一个
[1] Santosh Pande,et al. Multiverse: efficiently supporting distributed high-level speculation , 2013, OOPSLA.
[2] Mahadev Satyanarayanan,et al. The case for cyber foraging , 2002, EW 10.
[3] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[4] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[5] Kemal Ebcioğlu,et al. X 10 : Programming for Hierarchical Parallelism and Non-Uniform Data Access ( Extended , 2004 .
[6] Eric W. Weisstein. Subset Sum Problem , 2000 .
[7] Geoffrey H. Kuenning,et al. Saving portable computer battery power through remote process execution , 1998, MOCO.
[8] FoxArmando,et al. Adapting to network and client variability via on-demand dynamic distillation , 1996 .
[9] Ke Xu,et al. A Survey of Research on Mobile Cloud Computing , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.
[10] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[11] Bill Yeager,et al. Java mobile agents on project JXTA peer-to-peer platform , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[12] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation for Information Collection , 2011, TOSN.
[13] Stephanie Forrest,et al. Anonymous Data Collection in Sensor Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[14] Mahadev Satyanarayanan,et al. Self-tuned remote execution for pervasive computing , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[15] Laura Vasiliu,et al. CloneCloud: Elastic Execution between Mobile Device and Cloud , 2012 .
[16] Armando Solar-Lezama,et al. A language for automatically enforcing privacy policies , 2012, POPL '12.
[17] Santosh Pande,et al. Efficient application migration under compiler guidance , 2005, LCTES '05.
[18] Gabriel Antoniu,et al. An Efficient and Transparent Thread Migration Scheme in the PM2 Runtime System , 1999, IPPS/SPDP Workshops.
[19] Minho Shin,et al. Anonysense: privacy-aware people-centric sensing , 2008, MobiSys '08.
[20] Deborah Estrin,et al. Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.
[21] Manolis Terrovitis,et al. Privacy preservation in the dissemination of location data , 2011, SKDD.
[22] Alexandre M. Bayen,et al. Virtual trip lines for distributed privacy-preserving traffic monitoring , 2008, MobiSys '08.
[23] Michael Gertz,et al. Security and privacy for geospatial data: concepts and research directions , 2008, SPRINGL '08.
[24] Claude Castelluccia,et al. A security framework for privacy-preserving data aggregation in wireless sensor networks , 2011, TOSN.
[25] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[26] David R. Cheriton,et al. The V distributed system , 1988, CACM.
[27] Sheikh Iqbal Ahamed,et al. Preserving privacy in wireless sensor networks using reliable data aggregation , 2011, SIAP.
[28] Laxmikant V. Kalé,et al. CHARM++: a portable concurrent object oriented system based on C++ , 1993, OOPSLA '93.
[29] Xi Wang,et al. Improving application security with data flow assertions , 2009, SOSP '09.
[30] Sape J. Mullender,et al. Protium, an infrastructure for partitioned applications , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[31] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].