Controlled privacy in mobile cloud
暂无分享,去创建一个
[1] Lorrie Faith Cranor,et al. Improving App Privacy: Nudging App Developers to Protect User Privacy , 2014, IEEE Security & Privacy.
[2] Daniel Slamanig,et al. Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients , 2012, Privacy Enhancing Technologies.
[3] Mahadev Satyanarayanan,et al. Cloudlets: at the leading edge of cloud-mobile convergence , 2013, QoSA '13.
[4] Ling Liu. Privacy and location anonymization in location-based services , 2009, SIGSPACIAL.
[5] Dijiang Huang,et al. Enabling secure location-based services in mobile cloud computing , 2013, MCC '13.
[6] Sanjit Kumar Dash,et al. Privacy preserving K-Medoids clustering: an approach towards securing data in Mobile cloud architecture , 2012, CCSEIT '12.
[7] D. Popa,et al. A security framework for mobile cloud applications , 2013, 2013 11th RoEduNet International Conference.
[8] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[9] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[10] Chi-Yin Chow,et al. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.
[11] Jeffrey M. Voas,et al. BYOD: Security and Privacy Considerations , 2012, IT Professional.
[12] Jeffrey K. MacKie-Mason. Can We Afford Privacy from Surveillance? , 2014, IEEE Security & Privacy.
[13] Weisong Shi,et al. Location privacy in emerging network-based applications , 2012 .
[14] Pascal Felber,et al. Thrifty privacy: efficient support for privacy-preserving publish/subscribe , 2012, DEBS.
[15] Li Zhang,et al. Collaborative privacy management: mobile privacy beyond your own devices , 2014, SPME@MobiCom.
[16] Thomas Coughlin,et al. Security analysis of authentication protocols for next-generation mobile and CE cloud services , 2011, 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin).
[17] Debasish Jana,et al. Management of identity and credentials in mobile cloud environment , 2013, 2013 International Conference on Advanced Computer Science and Information Systems (ICACSIS).
[18] Elaine Shi,et al. Cloud Data Protection for the Masses , 2012, Computer.
[19] Chi-Sheng Shih,et al. Executing mobile applications on the cloud: Framework and issues , 2012, Comput. Math. Appl..
[20] Paramvir Bahl,et al. Advancing the state of mobile cloud computing , 2012, MCS '12.
[21] Benjamin Livshits,et al. MoRePriv: mobile OS support for application personalization and privacy , 2014, ACSAC.
[22] Debasish Jana,et al. Efficient management of security and privacy issues in mobile cloud environment , 2013, 2013 Annual IEEE India Conference (INDICON).
[23] Li-Chun Wang,et al. A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[24] A C Carrington. The professional. , 1995, The British journal of theatre nursing : NATNews : the official journal of the National Association of Theatre Nurses.
[25] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[26] Carsten Kleiner,et al. Using Mobile Devices with BYOD , 2013, Int. J. Web Portals.
[27] Ramesh Govindan,et al. Cloud-enabled privacy-preserving collaborative learning for mobile sensing , 2012, SenSys '12.
[28] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).