Mobile Cloud Computing: Architecture, Advantages and Security Issues
暂无分享,去创建一个
[1] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[2] Priya. A. Kotwal,et al. Evolution and effects of mobile cloud computing, middleware services on cloud, future prospects: A peek into the mobile cloud operating systems , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[3] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[4] Abhay Bansal,et al. Exploring challenges in Mobile cloud computing: An overview , 2013 .
[5] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[6] Hiroyuki Koga,et al. Simulation Study of Low Latency Network Architecture Using Mobile Edge Computing , 2017, IEICE Trans. Inf. Syst..
[7] R Senthamarai,et al. ANALYSIS OF SECURITY ISSUES FOR MOBILE CLOUD COMPUTING , 2020, International Journal of Engineering Applied Sciences and Technology.
[8] Mojtaba Alizadeh,et al. Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[9] Shiwen Mao,et al. A survey of mobile cloud computing for rich media applications , 2013, IEEE Wireless Communications.
[10] Mazliza Othman,et al. A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.
[11] Qijun Gu,et al. Secure Mobile Cloud Computing and Security Issues , 2014 .
[12] H. Vincent Poor,et al. Latency and Reliability-Aware Task Offloading and Resource Allocation for Mobile Edge Computing , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).
[13] Weizhe Zhang,et al. An Efficient and Secured Framework for Mobile Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[14] Mohammad Shojafar,et al. Mobile Cloud Computing: Challenges and Future Research Directions , 2017, 2017 10th International Conference on Developments in eSystems Engineering (DeSE).
[15] RahayuWenny,et al. Mobile cloud computing , 2013 .
[16] Saman A. Zonouz,et al. A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[17] Eui-nam Huh,et al. Dynamic resource provisioning through Fog micro datacenter , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[18] Hamid Harroud,et al. Mobile cloud computing for computation offloading: Issues and challenges , 2018 .
[19] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[20] Shan Lu,et al. Research of Cache Mechanism in Mobile Data Management , 2012, WISA.
[21] Mohammed S. Zahrani. Self-Protection and Security in Mobile Cloud Computing , 2016 .
[22] Shruti Goel,et al. Mobile Cloud Computing Architecture, Application Model, and Challenging Issues , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.
[23] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[24] Rittwik Jana,et al. Phoenix: Storage Using an Autonomous Mobile Infrastructure , 2013, IEEE Transactions on Parallel and Distributed Systems.
[25] Debashis De,et al. Mobile Cloud Computing: Architectures, Algorithms and Applications , 2015 .
[26] Dipayan Dev,et al. A Review and Research Towards Mobile Cloud Computing , 2014, MobileCloud.
[27] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[28] Matthias Lange,et al. Cellpot: A Concept for Next Generation Cellular Network Honeypots , 2014 .
[29] Weimin Zheng,et al. Design a cloud storage platform for pervasive computing environments , 2009, Cluster Computing.
[30] Daniel Andresen,et al. Jade: Reducing Energy Consumption of Android App , 2015, Int. J. Networked Distributed Comput..
[31] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[32] Olayinka Olafare,et al. A New Secure Mobile Cloud Architecture , 2015, ArXiv.
[33] Bo Li,et al. Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications , 2013, IEEE Wireless Communications.
[34] Zhibin Zhou,et al. Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[35] Jason Flinn,et al. Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.
[36] VasilakosAthanasios,et al. Security and privacy challenges in mobile cloud computing , 2017 .
[37] Laura Vasiliu,et al. CloneCloud: Elastic Execution between Mobile Device and Cloud , 2012 .
[38] Olivier Festor,et al. Anomaly traceback using software defined networking , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[39] Ali A. Ghorbani,et al. A Multi-agent System for Smartphone Intrusion Detection Framework , 2015 .
[40] Shahryar Shafique Qureshi,et al. Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[41] S. Rajalakshmi,et al. Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems , 2013, 2013 International Conference on Computer Sciences and Applications.