A multi-cloud approach for secure data storage on smart device
暂无分享,去创建一个
[1] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[2] Michael D. Hogan,et al. NIST Cloud Computing Standards Roadmap , 2013 .
[3] Avishay Traeger,et al. To Zip or not to Zip: effective resource usage for real-time compression , 2013, FAST.
[4] Jian Yang,et al. Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.
[5] Borko Furht,et al. Cloud Computing Fundamentals , 2010, Handbook of Cloud Computing.
[6] Sukhwinder Singh,et al. Mobile Cloud Computing , 2014 .
[7] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[8] Md. Atiqur Rahman,et al. A Review on Mobile Cloud Computing , 2015 .
[9] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[10] Koichiro Hayashi,et al. Social Issues of Big Data and Cloud: Privacy, Confidentiality, and Public Utility , 2013, 2013 International Conference on Availability, Reliability and Security.
[11] Securing the mobile enterprise with network-based security and cloud computing , 2012, 2012 35th IEEE Sarnoff Symposium.
[12] Matthew Metheny,et al. Security and Privacy in Public Cloud Computing , 2013, CloudCom 2013.
[13] Rajkumar Buyya,et al. Inter‐Cloud architectures and application brokering: taxonomy and survey , 2014, Softw. Pract. Exp..
[14] Arunkumar Gangula,et al. Survey on Mobile Computing Security , 2013, 2013 European Modelling Symposium.
[15] Siani Pearson,et al. Privacy and Security for Cloud Computing , 2012, Computer Communications and Networks.
[16] Juhi Sharma,et al. Cloud Security Challenges , 2012 .
[17] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[18] K. Karuppasamy,et al. Parallel Key Encryption for CBC And Interleaved CBC , 2010 .
[19] V. T. Raja,et al. Protecting the privacy and security of sensitive customer data in the cloud , 2012, Comput. Law Secur. Rev..
[20] Petter Svärd,et al. Self-management Challenges for Multi-cloud Architectures (Invited Paper) , 2011 .
[21] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[22] Jianxin Li,et al. CloudVO: Building a Secure Virtual Organization for Multiple Clouds Collaboration , 2010, 2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.
[23] Ismail Amr Ismail,et al. A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..
[24] Venkata Josyula,et al. Cloud Computing: Automating the Virtualized Data Center , 2011 .
[25] S. Rajalakshmi,et al. Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems , 2013, 2013 International Conference on Computer Sciences and Applications.
[26] Pierre Riteau. Building Dynamic Computing Infrastructures over Distributed Clouds , 2011, 2011 First International Symposium on Network Cloud Computing and Applications.
[27] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[28] Douglas Jacobson,et al. The Insecurity of Cloud Utility Models , 2013, IT Professional.
[29] Dijiang Huang,et al. MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.
[30] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[31] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[32] Raul Gracia-Tinedo,et al. Cloud-as-a-Gift: Effectively Exploiting Personal Cloud Free Accounts via REST APIs , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[33] Mojtaba Alizadeh,et al. Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[34] Pierre Riteau. Building Dynamic Computing Infrastructures over Distributed Clouds , 2011, NCCA.