Recent Advances Delivered in Mobile Cloud Computing's Security and Management Challenges
暂无分享,去创建一个
[1] Haoxiang Wang,et al. Computer and Cyber Security , 2018 .
[2] Yiliang Han,et al. Secure data outsourcing scheme in cloud computing with attribute-based encryption , 2018, Int. J. High Perform. Comput. Netw..
[3] Brij B. Gupta,et al. Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..
[4] Jianfeng Ma,et al. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2018, IEEE Systems Journal.
[5] Andreas P. Plageras,et al. Security and privacy of big data for social networking services in cloud , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[6] Firas AlBalas,et al. An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms , 2018, Int. J. Cloud Appl. Comput..
[7] B. B. Gupta,et al. Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment , 2017, Neural Computing and Applications.
[8] Yutaka Ishibashi,et al. Solutions for inter-connectivity and security in a smart hospital building , 2017, 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).
[9] Kostas E. Psannis,et al. Algorithms for Big Data in Advanced Communication Systems and Cloud Computing , 2017, 2017 IEEE 19th Conference on Business Informatics (CBI).
[10] Kostas E. Psannis,et al. Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey , 2017, Int. J. Netw. Manag..
[11] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[12] Kostas E. Psannis,et al. Efficient and secure BIG data delivery in Cloud Computing , 2017, Multimedia Tools and Applications.
[13] Jianqiang Li,et al. Computation Partitioning for Mobile Cloud Computing in a Big Data Environment , 2017, IEEE Transactions on Industrial Informatics.
[14] George Mastorakis,et al. On cohabitating networking technologies with common wireless access for home automation system purposes , 2016, IEEE Wireless Communications.
[15] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[16] Dharma P. Agrawal,et al. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .
[17] George Mastorakis,et al. Efficient entertainment services provision over a novel network architecture , 2016, IEEE Wireless Communications.
[18] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[19] George Mastorakis,et al. An evaluation of cloud-based mobile services with limited capacity: a linear approach , 2016, Soft Computing.
[20] Saman A. Zonouz,et al. CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..
[21] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[22] Ciprian Dobre,et al. Intelligent services for Big Data science , 2014, Future Gener. Comput. Syst..
[23] Abdullah Gani,et al. A Study on Strategic Provisioning of Cloud Computing Services , 2014, TheScientificWorldJournal.
[24] Issa M. Khalil,et al. Consolidated Identity Management System for secure mobile cloud computing , 2014, Comput. Networks.
[25] Rajkumar Buyya,et al. Inter‐Cloud architectures and application brokering: taxonomy and survey , 2014, Softw. Pract. Exp..
[26] Wu He,et al. Developing Vehicular Data Cloud Services in the IoT Environment , 2014, IEEE Transactions on Industrial Informatics.
[27] Axel Winkelmann,et al. Cloud Computing Data Protection -- A Literature Review and Analysis , 2014, 2014 47th Hawaii International Conference on System Sciences.
[28] Nazim Taskin,et al. A Pricing Model for Cloud Computing Service , 2014, 2014 47th Hawaii International Conference on System Sciences.
[29] Shaheed Zulfikar,et al. Security Issues and Challenges of Mobile Cloud Computing , 2013 .
[30] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[31] Sang Oh Park,et al. Trust management on user behavioral patterns for a mobile cloud computing , 2013, Cluster Computing.
[32] Rituparna Chaki,et al. Secure and trusted cloud of things , 2013, 2013 Annual IEEE India Conference (INDICON).
[33] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[34] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[35] Antonio Pescapè,et al. Cloud monitoring: A survey , 2013, Comput. Networks.
[36] D. Popa,et al. A security framework for mobile cloud applications , 2013, 2013 11th RoEduNet International Conference.
[37] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[38] Daan Broeder,et al. A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service , 2013, Journal of Internet Services and Applications.
[39] Rajkumar Buyya,et al. A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[40] Roman Beck,et al. Does Cloud Computing Matter? An Analysis of the Cloud Model Software-as-a-Service and Its Impact on Operational Agility , 2013, 2013 46th Hawaii International Conference on System Sciences.
[41] B. B. P. Rao,et al. Cloud computing for Internet of Things & sensing based applications , 2012, 2012 Sixth International Conference on Sensing Technology (ICST).
[42] Singh Hada Priyank,et al. Security Agents: A Mobile Agent Based Trust Model for Cloud Computing , 2011 .
[43] Max Mühlhäuser,et al. Towards a Trust Management System for Cloud Computing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[44] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[45] Yogesh L. Simmhan,et al. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[46] Daiyuan Peng,et al. Resource allocation for security services in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[47] Martin Hilbert,et al. The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.
[48] Ilias Maglogiannis,et al. Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[49] Bharat K. Bhargava,et al. An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[50] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[51] Kostas E. Psannis,et al. Advanced Media-Based Smart Big Data on Intelligent Cloud Systems , 2019, IEEE Transactions on Sustainable Computing.
[52] Yutaka Ishibashi,et al. Algorithms for Efficient Digital Media Transmission over IoT and Cloud Networking , 2018, J. Multim. Inf. Syst..
[53] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[54] Shingo Yamaguchi,et al. Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey , 2016 .
[55] Supriya Kinger,et al. Analysis of Security Algorithms in Cloud Computing , 2014 .
[56] Sebastian Andersson,et al. A study of the advantages & disadvantages of mobile cloud computing versus native environment , 2013 .
[57] Gurpreet Singh,et al. Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security , 2013 .
[58] Jayadev Gyani,et al. Mobile Cloud Computing: Implications and Challenges , 2012 .
[59] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[60] M. D. Leenheer,et al. A high performance fingerprint liveness detection method based on quality related features , 2021, Future Gener. Comput. Syst..
[61] R. Buyya,et al. A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..
[62] M. L. M. Kiah,et al. Towards secure mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..