A Prospective Study of Mobile Cloud Computing
暂无分享,去创建一个
Mojtaba Alizadeh | Touraj Khodadadi | Saman Shojae Chaeikar | Mazdak Zamani | Wan Haslina Hassan | W. H. Hassan | M. Alizadeh | M. Zamani | T. Khodadadi
[1] Mojtaba Alizadeh,et al. Identifying Benefits and risks associated with utilizing cloud computing , 2014, ArXiv.
[2] Devinder Singh,et al. Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment , 2012 .
[3] Prashant J. Shenoy,et al. Dynamic Provisioning of Multi-tier Internet Applications , 2005, Second International Conference on Autonomic Computing (ICAC'05).
[4] Pritesh Jain,et al. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.
[5] Jason Flinn,et al. Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.
[6] Sanjit Kumar Dash,et al. Mobile-Cloud: A Framework of Cloud Computing for Mobile Application , 2012 .
[7] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[8] Muhammad Shiraz,et al. SAMI: Service-based arbitrated multi-tier infrastructure for Mobile Cloud Computing , 2012, 2012 1st IEEE International Conference on Communications in China Workshops (ICCC).
[9] James M. Rehg,et al. A Compilation Framework for Power and Energy Management on Mobile Computers , 2001, LCPC.
[10] Rajkumar Buyya,et al. Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.
[11] Ajith Abraham,et al. Secure Private Cloud Architecture for Mobile Infrastructure as a Service , 2012, 2012 IEEE Eighth World Congress on Services.
[12] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[13] Rajkumar Buyya,et al. The Aneka platform and QoS-driven resource provisioning for elastic applications on hybrid Clouds , 2012, Future Gener. Comput. Syst..
[14] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.
[15] Li-Chun Wang,et al. A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[16] Mojtaba Alizadeh,et al. Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[17] Dennis G. Shea,et al. Cloud Service Portal for Mobile Device Management , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.
[18] Mahadev Satyanarayanan,et al. Fundamental challenges in mobile computing , 1996, PODC '96.
[19] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[20] Ke Xu,et al. A Survey of Research on Mobile Cloud Computing , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.
[21] Xiao Ma,et al. A Survey of Energy Efficient Wireless Transmission and Modeling in Mobile Cloud Computing , 2012, Mobile Networks and Applications.
[22] Luis Miguel Vaquero Gonzalez,et al. Locking the sky: a survey on IaaS cloud security , 2010, Computing.
[23] Shahryar Shafique Qureshi,et al. Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[24] Mojtaba Alizadeh,et al. A brief review of mobile cloud computing opportunities , 2013 .
[25] Zhu Guang-lin. On"Cloud Computing" , 2011 .
[26] Qi Zhang,et al. A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications , 2007, Fourth International Conference on Autonomic Computing (ICAC'07).
[27] Chaokun Wang,et al. Phosphor: A Cloud Based DRM Scheme with Sim Card , 2010, 2010 12th International Asia-Pacific Web Conference.
[28] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[29] Asim Smailagic,et al. System design and power optimization for mobile computers , 2002, Proceedings IEEE Computer Society Annual Symposium on VLSI. New Paradigms for VLSI Systems Design. ISVLSI 2002.
[30] Wei-Tek Tsai,et al. Service-Oriented Cloud Computing Architecture , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[31] Stanislav Kurkovsky,et al. RFID-Based Authentication Middleware for Mobile Devices , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[32] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[33] Borja Sotomayor,et al. Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.
[34] Guiran Chang,et al. Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .
[35] Sakshi Kaushal,et al. Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.
[36] Sheng-Yuan Yang,et al. An ontology-supported ubiquitous interface agent for cloud computing — Example on Bluetooth wireless technique with Java programming , 2010, 2010 International Conference on Machine Learning and Cybernetics.
[37] Jason H. Christensen,et al. Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.
[38] D. B. Davis,et al. Sun Microsystems Inc. , 1993 .
[39] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[40] Jun Zhu,et al. Framework for building a low-cost, scalable, and secured platform for Web-delivered business services , 2010, IBM J. Res. Dev..
[41] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[42] T. H. Tse,et al. A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[43] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[44] Linda Dailey Paulson. Low-Power Chips for High-Powered Handhelds , 2003, Computer.
[45] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[46] Eugene Marinelli,et al. Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .
[47] Cecilia Mascolo,et al. Satin: A Component Model for Mobile Self Organisation , 2004, CoopIS/DOA/ODBASE.
[48] Han Qi,et al. Research on mobile cloud computing: Review, trend and perspectives , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).
[49] Luis Miguel Vaquero Gonzalez,et al. Building safe PaaS clouds: A survey on security in multitenant software platforms , 2012, Comput. Secur..
[50] Eui-Nam Huh,et al. Towards the Development of Personal Cloud Computing for Mobile Thin-Clients , 2011, 2011 International Conference on Information Science and Applications.
[51] Xue Jing,et al. A Brief Survey on the Security Model of Cloud Computing , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
[52] Geoffrey H. Kuenning,et al. Saving portable computer battery power through remote process execution , 1998, MOCO.
[53] Rajkumar Buyya,et al. InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.
[54] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[55] Jiankun Hu,et al. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment , 2011, Secur. Commun. Networks.
[56] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[57] Eyal de Lara,et al. Interactive Resource-Intensive Applications Made Easy , 2007, Middleware.
[58] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[59] Ralf Kakerow,et al. Low power design methodologies for mobile communication , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.
[60] Mojtaba Alizadeh,et al. Associated Risks of Cloud Computing for SMEs , 2012 .
[61] Jukka K. Nurminen,et al. Energy Efficiency of Mobile Clients in Cloud Computing , 2010, HotCloud.
[62] Hossam S. Hassanein,et al. Handoffs in fourth generation heterogeneous networks , 2006, IEEE Communications Magazine.
[63] Xinwen Zhang,et al. Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.
[64] Roberto Di Pietro,et al. Transparent security for cloud , 2010, SAC '10.
[65] S. Kotani,et al. TrustCube: An Infrastructure that Builds Trust in Client , 2009 .
[66] Mufajjul Ali,et al. Green Cloud on the Horizon , 2009, CloudCom.