Mobile Cloud Computing and Its Security and Privacy Challenges
暂无分享,去创建一个
[1] Stefan Rommer,et al. SAE and the Evolved Packet Core: Driving the Mobile Broadband Revolution , 2009 .
[2] Trent Jaeger,et al. Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.
[3] Hans D. Schotten,et al. Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[4] Mokdong Chung,et al. Adaptive security management model in the cloud computing environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[5] Hassan Takabi,et al. Semantic-based policy management for cloud computing environments , 2012, Int. J. Cloud Comput..
[6] Yifeng Chen,et al. PARRAY: a unifying array representation for heterogeneous parallelism , 2012, PPoPP '12.
[7] Nils Gruschka,et al. Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[8] Myong H. Kang,et al. Security and Architectural Issues for National Security Cloud Computing , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[9] Jemal H. Abawajy,et al. A Layered Security Approach for Cloud Computing Infrastructure , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.
[10] Yin Hu,et al. Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.
[11] Yuh-Jong Hu,et al. Semantics-Enabled Policies for Information Sharing and Protection in the Cloud , 2011, SocInfo.
[12] Eui-nam Huh,et al. Personal Cloud Computing Security Framework , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.
[13] Sakshi Kaushal,et al. Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.
[14] Hassan Takabi,et al. Toward a Semantic Based Policy Management Framework for Interoperable Cloud Environments , 2012 .
[15] Maria Andréia F. Rodrigues,et al. Interactive Rendering of Indoor and Urban Environments on Handheld Devices by Combining Visibility Algorithms with Spatial Data Structures , 2011, Int. J. Handheld Comput. Res..
[16] Minlan Yu,et al. CloudPolice: taking access control out of the network , 2010, Hotnets-IX.
[17] T. K. Lakshman,et al. Enhancing enterprise field productivity via cross platform mobile cloud apps , 2011, MCS '11.
[18] Ali Acilar. Factors Affecting Mobile Phone Use Among Undergraduate Students in Turkey: An Exploratory Analysis , 2013 .
[19] Gustavo Alonso,et al. Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications , 2009, Middleware.
[20] Dongwan Shin,et al. Permission Management System: Permission as a Service in Cloud Computing , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[21] Stefania Sesia,et al. LTE - The UMTS Long Term Evolution, Second Edition , 2011 .
[22] N. Raghavendra Rao,et al. Establishing Synergy between Cloud Computing and Colloborative Technology in Medical Informatics , 2015 .
[23] Hassan Takabi,et al. DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[24] Arati Baliga,et al. VPMN: virtual private mobile network towards mobility-as-a-service , 2011, MCS '11.
[25] Yu Guo,et al. Multi-Tenancy Based Access Control in Cloud , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[26] S. Srinivasan,et al. Meeting Compliance Requirements While Using Cloud Services , 2019, Cloud Security.
[27] Dongman Lee,et al. A virtual cloud computing provider for mobile devices , 2010, MCS '10.
[28] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[29] Zaigham Mahmood. Cloud Computing Technologies for Connected Government , 2015 .
[30] Mukesh Singhal,et al. Information flow control in cloud computing , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[31] Gail-Joon Ahn,et al. Privacy-Enhanced User-Centric Identity Management , 2009, 2009 IEEE International Conference on Communications.
[32] S. Srinivasan. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments , 2014 .
[33] Winfried Lamersdorf,et al. Towards mobile process as a service , 2010, SAC '10.
[34] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[35] Ravi S. Sandhu,et al. Towards a discipline of mission-aware cloud computing , 2010, CCSW '10.
[36] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[37] Susmit Bagchi,et al. Emerging Research in Cloud Distributed Computing Systems , 2015 .
[38] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[39] Kamel Rouibah,et al. Effect of Personal Innovativeness, Attachment Motivation and Social Norms on the Acceptance of Camera Mobile Phones: An Empirical Study in an Arab Country , 2011, Int. J. Handheld Comput. Res..
[40] P. V. G. D. Prasad Reddy,et al. A Threat Free Architecture for Privacy Assurance in Cloud Computing , 2011, 2011 IEEE World Congress on Services.
[41] Matthias Jarke,et al. Mobile Access to MPEG-7 Based Multimedia Services , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.
[42] Hassan Takabi,et al. An architecture for specification and enforcement of temporal access control constraints using OWL , 2009, SWS '09.
[43] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[44] Gail-Joon Ahn,et al. Role-based privilege and trust management , 2005, Comput. Syst. Sci. Eng..
[45] Shubhashis Sengupta,et al. Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.
[46] Elisa Bertino,et al. Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..
[47] Daniele Catteddu and Giles Hogben. Cloud Computing. Benefits, risks and recommendations for information security , 2009 .
[48] In Lee. Strategy, Adoption, and Competitive Advantage of Mobile Services in the Global Economy , 2012 .
[49] Takayuki Sasaki,et al. Content oriented virtual domains for secure information sharing across organizations , 2010, CCSW '10.
[50] Jörg Schwenk,et al. Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[51] Jörg Schwenk,et al. Security Prospects through Cloud Computing by Adopting Multiple Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[52] James Bret Michael,et al. Cloud to cloud interoperability , 2011, 2011 6th International Conference on System of Systems Engineering.
[53] Abhishek Vaish,et al. 3 dimensional security in cloud computing , 2011, 2011 3rd International Conference on Computer Research and Development.
[54] Angelos D. Keromytis,et al. Dynamic Trust Management , 2009, Computer.
[55] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[56] Eugene Marinelli,et al. Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .
[57] Kaisa Väänänen,et al. User experience of mobile photo sharing in the cloud , 2010, MUM.
[58] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[59] Jie Liu,et al. Pocket cloudlets , 2011, ASPLOS XVI.
[60] Tao Feng,et al. Jupiter: transparent augmentation of smartphone capabilities through cloud computing , 2011, MobiHeld '11.
[61] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[62] Sangeeta N. Dhamdhere,et al. Cloud Computing and Virtualization Technologies in Libraries , 2013 .
[63] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[64] Wei-Tek Tsai,et al. Role-Based Access-Control Using Reference Ontology in Clouds , 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems.
[65] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[66] Hassan Takabi,et al. StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy , 2010, SACMAT '10.
[67] Gabriel Antoniu,et al. Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.
[68] Martin Gilje Jaatun,et al. Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.
[69] Xiaodong Lin,et al. SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[70] Cynthia E. Irvine,et al. A cloud-oriented cross-domain security architecture , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[71] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[72] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[73] Xuejie Zhang,et al. Realization of open cloud computing federation based on mobile agent , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[74] Ravi Pendse,et al. Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[75] R. Pavithra,et al. Secure Role based Data Access Control in Cloud Computing , 2011 .
[76] Yong Tang,et al. Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[77] James B. D. Joshi,et al. A collaborative approach to facilitate intrusion detection and response against DDoS attacks. , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[78] Doan B. Hoang,et al. Mobile Cloud for Assistive Healthcare (MoCAsH) , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.
[79] Daniele Sgandurra,et al. Cloud Security Is Not (Just) Virtualization Security , 2009 .
[80] Elisa Bertino,et al. Access-control language for multidomain environments , 2004, IEEE Internet Computing.
[81] Xiaofeng Liao,et al. Cloud computing privacy & security global issues, challenges, & mechanisms , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).
[82] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[83] Gail-Joon Ahn,et al. Security and Privacy in Cloud Computing: Towards a Comprehensive Framework , 2013 .
[84] Prashant Srivastava,et al. An architecture based on proactive model for security in cloud computing , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[85] Shadi Aljawarneh,et al. Advanced Research on Cloud Computing Design and Applications , 2015 .
[86] Benny Rochwerger,et al. Inter-cloud mobility of virtual machines , 2011, SYSTOR '11.
[87] Jason H. Christensen,et al. Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.
[88] Saad Bani-Mohammad,et al. Submesh Allocation in 3D Mesh Multicomputers Using Free Lists: A Corner-Boundary Approach with Complete Recognition Capability , 2015 .
[89] Xue Jing,et al. A Brief Survey on the Security Model of Cloud Computing , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
[90] Mario Golling,et al. Security Management Areas in the Inter-cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[91] Shih-Hao Hung,et al. Developing Collaborative Applications with Mobile Cloud - A Case Study of Speech Recognition , 2011, J. Internet Serv. Inf. Secur..
[92] Milan Petkovic,et al. A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[93] Vassilka Tchifilionova,et al. Security and Privacy Implications of Cloud Computing - Lost in the Cloud , 2010, iNetSec.
[94] Ahmed Shawish,et al. Cloud-Based Healthcare Systems: Emerging Technologies and Open Research Issues , 2016 .
[95] Gail-Joon Ahn,et al. SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[96] Ming Gu,et al. Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing , 2011, ISPEC.
[97] A. B. M. Shawkat Ali,et al. Above the Trust and Security in Cloud Computing: A Notion Towards Innovation , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[98] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .