Security Aspects of Cloud Based Mobile Health Care Application
暂无分享,去创建一个
Josef Horalek | Richard Cimler | Vladimir Sobeslav | Jan Matyska | Ladislav Balik | R. Cimler | J. Horalek | V. Sobeslav | J. Matyska | Ladislav Balík
[1] Mário M. Freire,et al. Security issues in cloud environments: a survey , 2014, International Journal of Information Security.
[2] Dongho Won,et al. Security Issues and Threats According to the Attribute of Cloud Computing , 2012 .
[3] Petr Tucník,et al. Mobile Monitoring System for Elder People Healthcare and AAL , 2013, Intelligent Environments.
[4] Jia Weihua,et al. Research on the Security Issues of Cloud Computing , 2013 .
[5] Federico Mancini,et al. Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings , 2012, ESSoS.
[6] Tai-hoon Kim,et al. Computer Applications for Security, Control and System Engineering , 2012, Communications in Computer and Information Science.
[7] Jonathan Wood,et al. Authentication, Authorization and Accounting (AAA) Transport Profile , 2003, RFC.
[8] Monica Borda,et al. Secure Mobile-Cloud Framework - Implementation on the Mobile Device , 2013 .
[9] Úlfar Erlingsson,et al. Engineering Secure Software and Systems , 2011, Lecture Notes in Computer Science.
[10] G. Padmavathi,et al. Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism , 2012 .
[11] Tereza Otcenásková,et al. A proposal for a computer-based framework of support for public health in the management of biological incidents: the Czech Republic experience , 2012, Perspectives in public health.
[12] Haralambos Mouratidis,et al. A framework to support selection of cloud providers based on security and privacy requirements , 2013, J. Syst. Softw..
[13] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[14] Zhenyu Du,et al. Intelligence Computation and Evolutionary Computation , 2013 .
[15] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[16] Minho Kim,et al. A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security , 2012 .
[17] Mukesh Singhal,et al. Collaboration in multicloud computing environments: Framework and security issues , 2013, Computer.
[18] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.