The Reality and Future of the Secure Mobile Cloud Computing (SMCC): Survey
暂无分享,去创建一个
[1] Ajith Abraham,et al. An auction method for resource allocation in computational grids , 2009 .
[2] Chuan Wu,et al. A Resource Auction Based Allocation Mechanism in the Cloud Computing Environment , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.
[3] Jason H. Christensen,et al. Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.
[4] Paul Krzyzanowski. Process Synchronization and Election Algorithms , 2009 .
[5] José Helano Matos Nogueira. Mobile Intelligent Agents to Fight Cyber Intrusions , 2006 .
[6] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[7] Liu Wei-feng. Research of Mobile Agent-based Security in the E-commerce , 2004 .
[8] Pan Hui,et al. ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading , 2012, 2012 Proceedings IEEE INFOCOM.
[9] Ralf Kakerow,et al. Low power design methodologies for mobile communication , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.
[10] Grady N. Drew. Using Set for Secure Electronic Commerce , 1998 .
[11] Byung-Gon Chun,et al. Augmented Smartphone Applications Through Clone Cloud Execution , 2009, HotOS.
[12] Chaokun Wang,et al. Phosphor: A Cloud Based DRM Scheme with Sim Card , 2010, 2010 12th International Asia-Pacific Web Conference.
[13] Wei Liang-fen. A Migration Mechanism of Mobile Agent System Supporting Security and Fault-Tolerance , 2007 .
[14] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[15] Muli Ben-Yehuda,et al. The Reservoir model and architecture for open federated cloud computing , 2009, IBM J. Res. Dev..
[16] Samaher Al-Janabi,et al. A Hybrid Image steganography method based on genetic algorithm , 2016, 2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).
[17] Tao Li,et al. A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[18] Samaher Al-Janabi,et al. Pragmatic Miner to Risk Analysis for Intrusion Detection (PMRA-ID) , 2017, SCDS.
[19] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[20] Samaher Al-Janabi,et al. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .
[21] Sherali Zeadally,et al. Mobile cloud computing: Challenges and future research directions , 2018, J. Netw. Comput. Appl..
[22] Geoffrey H. Kuenning,et al. Saving portable computer battery power through remote process execution , 1998, MOCO.
[23] Yan Guoqing,et al. Research of Mobile Security Solution for Fourth Party Logistics , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.
[24] Linda Dailey Paulson. Low-Power Chips for High-Powered Handhelds , 2003, Computer.
[25] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[26] Kaisa Väänänen,et al. User experience of mobile photo sharing in the cloud , 2010, MUM.
[27] Samaher Al-Janabi,et al. Evaluation prediction techniques to achievement an optimal biomedical analysis , 2019 .
[28] Ben Smyth,et al. Formal verification of cryptographic protocols with automated reasoning , 2011 .
[29] Qin Zhou,et al. A PKI-based mechanism for secure and efficient access to outsourced data , 2010, 2010 International Conference on Networking and Digital Society.
[30] Mohammad Shojafar,et al. Mobile Cloud Computing: Challenges and Future Research Directions , 2017, 2017 10th International Conference on Developments in eSystems Engineering (DeSE).
[31] Seyed Masoud Sadjadi,et al. Mobile Service Clouds: A Self-Managing Infrastructure for Autonomic Mobile Computing Services , 2006, SelfMan.
[32] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[33] Cjf Cas Cremers. Scyther : semantics and verification of security protocols , 2006 .
[34] L. Youseff,et al. Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.
[35] Parthasarathy Ranganathan,et al. Energy Consumption in Mobile Devices: Why Future Systems Need Requirements-Aware Energy Scale-Down , 2003, PACS.
[36] Xinwen Zhang,et al. Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms , 2010, MOBILWARE.
[37] Leon Sterling,et al. Privacy and forensics investigation process: The ERPINA protocol , 2008, Comput. Stand. Interfaces.
[38] Isao Ono,et al. Applying Double-Sided Combinational Auctions to Resource Allocation in Cloud Computing , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.
[39] Ratan K. Guha,et al. Understanding the intruder through attacks on cryptographic protocols , 2006, ACM-SE 44.
[40] Lin Chen. Security model of mobile agent in e-commerce , 2005 .
[41] Samaher Al-Janabi,et al. A secure NFC mobile payment protocol based on biometrics with formal verification , 2016 .
[42] David Abramson,et al. Economic Models for Management of Resources in Grid Computing , 2001, ArXiv.
[43] N. Ch. S. N. Iyengar,et al. A Model for Mobile Agent Security in E-Business Applications , 2007 .
[44] Shahryar Shafique Qureshi,et al. Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[45] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[46] Haiyun Luo,et al. Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones , 2012, 2012 Proceedings IEEE INFOCOM.
[47] Hans D. Schotten,et al. Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[48] Sung Chan Jun,et al. An SLA-based cloud computing that facilitates resource allocation in the distributed data centers of a cloud provider , 2012, The Journal of Supercomputing.
[49] David Abramson,et al. Economic models for resource management and scheduling in Grid computing , 2002, Concurr. Comput. Pract. Exp..
[50] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[51] John Zahorjan,et al. The challenges of mobile computing , 1994, Computer.
[52] J. W. Davis. Power benchmark strategy for systems employing power management , 1993, Proceedings of the 1993 IEEE International Symposium on Electronics and the Environment.
[53] Samaher AlJanabi,et al. Smart system to create an optimal higher education environment using IDA and IOTs , 2018, International Journal of Computers and Applications.
[54] Ibrahim AlShourbaji,et al. A Study of Cyber Security Awareness in Educational Environment in the Middle East , 2016, J. Inf. Knowl. Manag..
[55] Samaher Hussein Ali. Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm , 2013, 2013 Sixth International Conference on Developments in eSystems Engineering.
[56] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[57] Dennis G. Shea,et al. Cloud Service Portal for Mobile Device Management , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.
[58] Xiaoyan Yang,et al. On 3G mobile E-commerce platform based on Cloud Computing , 2010, 2010 3rd IEEE International Conference on Ubi-Media Computing.
[59] John Strassner,et al. Implementing Next Generation Services Using Policy-Based Management and Autonomic Computing Principles , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.