메뉴 건너뛰기




Volumn 66, Issue 3, 2013, Pages 1687-1706

Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing

Author keywords

Cloud computing; Mobile cloud computing; Privacy; Security

Indexed keywords

AUTHENTICATION; CLOUD COMPUTING; DATA PRIVACY; ENERGY UTILIZATION; MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; STORAGE AS A SERVICE (STAAS);

EID: 84888011760     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-013-0967-y     Document Type: Article
Times cited : (47)

References (35)
  • 2
    • 80052799305 scopus 로고    scopus 로고
    • Policy based resource allocation in IaaS cloud
    • 10.1016/j.future.2011.05.016
    • Nathani A, Chaudhary S, Somani G (2012) Policy based resource allocation in IaaS cloud. Future Gener Comput Syst 26(1):94-103
    • (2012) Future Gener Comput Syst , vol.26 , Issue.1 , pp. 94-103
    • Nathani, A.1    Chaudhary, S.2    Somani, G.3
  • 4
    • 84888011017 scopus 로고    scopus 로고
    • Google App Engine 02 September 2011
    • Google App Engine (2011) https://developers.google.com/appengine/. 02 September 2011
    • (2011)
  • 5
    • 84888016274 scopus 로고    scopus 로고
    • 06 September 2011
    • Force.com Apex Code Developer's Guide (2011) http://www.salesforce.com/ us/developer/docs/apexcode/index.htm. 06 September 2011
    • (2011) Force com Apex Code Developer's Guide
  • 6
    • 84886722799 scopus 로고    scopus 로고
    • A study on virtual machine deployment for application outsourcing in mobile cloud computing
    • 10.1007/s11227-012-0846-y
    • Shiraz M, Abolfazli S, Sanaei Z, Gani A, Gani A (2013) A study on virtual machine deployment for application outsourcing in mobile cloud computing. J Supercomput 63(3):946-964
    • (2013) J Supercomput , vol.63 , Issue.3 , pp. 946-964
    • Shiraz, M.1    Abolfazli, S.2    Sanaei, Z.3    Gani, A.4    Gani, A.5
  • 7
    • 77951039985 scopus 로고    scopus 로고
    • Cloud computing for mobile users: Can offloading computation save energy?
    • Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? IEEE Trans Comput 43(4):51-56
    • (2010) IEEE Trans Comput , vol.43 , Issue.4 , pp. 51-56
    • Kumar, K.1    Lu, Y.H.2
  • 16
    • 80052758369 scopus 로고    scopus 로고
    • Meetings through the cloud: Privacy-preserving scheduling on mobile devices
    • 10.1016/j.jss.2011.04.027 Special on Mobile Applications: Status and Trends
    • Bilogrevic I, Jadliwalaa M, Kumarb P, Waliab SS, Hubauxa JP, Aadc I, Niemic V (2011) Meetings through the cloud: privacy-preserving scheduling on mobile devices. J Syst Softw 84(11):1910-1927. Special Issue on Mobile Applications: Status and Trends
    • (2011) J Syst Softw , vol.84 , Issue.11 , pp. 1910-1927
    • Bilogrevic, I.1    Jadliwalaa, M.2    Kumarb, P.3    Waliab, S.S.4    Hubauxa, J.P.5    Aadc, I.6    Niemic, V.7
  • 18
    • 80053551895 scopus 로고    scopus 로고
    • Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
    • 10.1016/S1007-0214(11)70070-0
    • Ren W, Yu L, Gao R, Xiong F (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. J Tsinghua Univ (Sci Technol) 16(5):520-528
    • (2011) J Tsinghua Univ (Sci Technol) , vol.16 , Issue.5 , pp. 520-528
    • Ren, W.1    Yu, L.2    Gao, R.3    Xiong, F.4
  • 21
    • 79961227180 scopus 로고    scopus 로고
    • Provable data possession of resource constrained mobile devices in cloud computing
    • Yang J, Wang H, Wang J, Tan C, Yu D (2011) Provable data possession of resource constrained mobile devices in cloud computing. J Netw 6(7):1033-1040
    • (2011) J Netw , vol.6 , Issue.7 , pp. 1033-1040
    • Yang, J.1    Wang, H.2    Wang, J.3    Tan, C.4    Yu, D.5
  • 22
    • 84862956001 scopus 로고    scopus 로고
    • Efficient and secure data storage operations for mobile cloud computing
    • Zhou Z, Huang D (2011) Efficient and secure data storage operations for mobile cloud computing. In: IACR cryptology eprint archive, p 185
    • (2011) IACR Cryptology Eprint Archive , pp. 185
    • Zhou, Z.1    Huang, D.2
  • 24
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • 10.1145/1127345.1127346
    • Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur 9(1):1-30
    • (2005) ACM Trans Inf Syst Secur , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 25
    • 84887992156 scopus 로고    scopus 로고
    • Re-encryption-based key management towards secure and scalable mobile applications in clouds
    • Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR cryptology eprint archive, p 668
    • (2011) IACR Cryptology Eprint Archive , pp. 668
    • Tysowski, P.K.1    Hasan, M.A.2
  • 26
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • 798552 10.1109/TIT.1985.1057074
    • ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469-472
    • (1985) IEEE Trans Inf Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 28
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • 760548 10.1016/0022-0000(84)90070-9
    • Goldwasser S, Micali S (1984) Probabilistic encryption. J Comput Syst Sci 28(2):270-299
    • (1984) J Comput Syst Sci , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 30
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure scalable and fine-grained data access control in cloud computing
    • San Diego, CA, USA Mar 2010
    • Yu S, Wang C, Ren K, Lou W (2010) Achieving secure scalable and fine-grained data access control in cloud computing. In: Proc IEEE INFOCOM (INFOCOM '10), San Diego, CA, USA, Mar 2010
    • (2010) Proc IEEE INFOCOM (INFOCOM '10)
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 31
    • 84888007830 scopus 로고    scopus 로고
    • Adjusting Application Performance 10 July 2012
    • Adjusting Application Performance (2012) https://developers.google.com/ appengine/docs/adminconsole/performancesettings. 10 July 2012
    • (2012)
  • 32
    • 84888011990 scopus 로고    scopus 로고
    • Code Coverage 19 June 2012
    • Code Coverage (2012) https://developers.google.com/web-toolkit/doc/ latest/DevGuideTestingCoverage. 19 June 2012
    • (2012)
  • 33
    • 84887999427 scopus 로고    scopus 로고
    • DeviceInfo API July 2012
    • DeviceInfo API (2012) http://www.blackberry.com/developers/docs/4.3.0api/ net/rim/device/api/system/DeviceInfo.html. July 2012
    • (2012)
  • 34
    • 84888013069 scopus 로고    scopus 로고
    • System.currentTimeMillis() vs. new Date() vs. Calendar.getInstance(). getTime() April 12 2013
    • System.currentTimeMillis() vs. new Date() vs. Calendar.getInstance(). getTime() (2012) http://stackoverflow.com/questions/368094/system- currenttimemillis-vs-new-date-vs-calendar-getinstance-gettime. April 12 2013
    • (2012)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.