-
1
-
-
84866668858
-
Towards secure mobile cloud computing: A survey
-
10.1016/j.future.2012.08.003
-
Khan AN, Kiah MLM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278-1299
-
(2013)
Future Gener Comput Syst
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
Kiah, M.L.M.2
Khan, S.U.3
Madani, S.A.4
-
2
-
-
80052799305
-
Policy based resource allocation in IaaS cloud
-
10.1016/j.future.2011.05.016
-
Nathani A, Chaudhary S, Somani G (2012) Policy based resource allocation in IaaS cloud. Future Gener Comput Syst 26(1):94-103
-
(2012)
Future Gener Comput Syst
, vol.26
, Issue.1
, pp. 94-103
-
-
Nathani, A.1
Chaudhary, S.2
Somani, G.3
-
3
-
-
67650404318
-
-
1 O'Reilly Media Sebastopol
-
Murty J (2008) Programing Amazon Web services: S3, EC2, SQS, FPS, and SimpleDB, 1st edn. O'Reilly Media, Sebastopol
-
(2008)
Programing Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
-
-
Murty, J.1
-
4
-
-
84888011017
-
-
Google App Engine 02 September 2011
-
Google App Engine (2011) https://developers.google.com/appengine/. 02 September 2011
-
(2011)
-
-
-
5
-
-
84888016274
-
-
06 September 2011
-
Force.com Apex Code Developer's Guide (2011) http://www.salesforce.com/ us/developer/docs/apexcode/index.htm. 06 September 2011
-
(2011)
Force com Apex Code Developer's Guide
-
-
-
6
-
-
84886722799
-
A study on virtual machine deployment for application outsourcing in mobile cloud computing
-
10.1007/s11227-012-0846-y
-
Shiraz M, Abolfazli S, Sanaei Z, Gani A, Gani A (2013) A study on virtual machine deployment for application outsourcing in mobile cloud computing. J Supercomput 63(3):946-964
-
(2013)
J Supercomput
, vol.63
, Issue.3
, pp. 946-964
-
-
Shiraz, M.1
Abolfazli, S.2
Sanaei, Z.3
Gani, A.4
Gani, A.5
-
7
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? IEEE Trans Comput 43(4):51-56
-
(2010)
IEEE Trans Comput
, vol.43
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.H.2
-
9
-
-
74049110034
-
Securing elastic applications on mobile devices for cloud computing
-
Chicago, IL, USA Nov 2009
-
Zhang X, Schiffman J, Gibbs S, Kunjithapatham A, Jeong S (2009) Securing elastic applications on mobile devices for cloud computing. In: Proc ACM workshop on cloud computing security (CCSW '09), Chicago, IL, USA, Nov 2009
-
(2009)
Proc ACM Workshop on Cloud Computing Security (CCSW '09)
-
-
Zhang, X.1
Schiffman, J.2
Gibbs, S.3
Kunjithapatham, A.4
Jeong, S.5
-
12
-
-
78650121432
-
Authentication in the clouds: A framework and its application to mobile users
-
Chicago, USA Oct 2010
-
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proc ACM cloud computing security workshop (CCSW '10), Chicago, USA, Oct 2010
-
(2010)
Proc ACM Cloud Computing Security Workshop (CCSW '10)
-
-
Chow, R.1
Jakobsson, M.2
Masuoka, R.3
Molina, J.4
Niu, Y.5
Shi, E.6
Song, Z.7
-
13
-
-
78449236807
-
MobiCloud: Building secure cloud framework for mobile computing and communication
-
Nanjing, China June 2010
-
Huan D, Zhang X, Kang M, Luo J (2010) MobiCloud: building secure cloud framework for mobile computing and communication. In: Proc 5th IEEE int symposium on service oriented system engineering (SOSE '10), Nanjing, China, June 2010
-
(2010)
Proc 5th IEEE Int Symposium on Service Oriented System Engineering (SOSE '10)
-
-
Huan, D.1
Zhang, X.2
Kang, M.3
Luo, J.4
-
14
-
-
79960590319
-
Secure data processing framework for MobileCloud computing
-
Shanghai, China June 2011
-
Huang D, Zhou Z, Xu L, Xing T, Zhong Y (2011) Secure data processing framework for MobileCloud computing. In: Proc IEEE INFOCOM workshop on cloud computing (INFOCOM '11), Shanghai, China, June 2011
-
(2011)
Proc IEEE INFOCOM Workshop on Cloud Computing (INFOCOM '11)
-
-
Huang, D.1
Zhou, Z.2
Xu, L.3
Xing, T.4
Zhong, Y.5
-
16
-
-
80052758369
-
Meetings through the cloud: Privacy-preserving scheduling on mobile devices
-
10.1016/j.jss.2011.04.027 Special on Mobile Applications: Status and Trends
-
Bilogrevic I, Jadliwalaa M, Kumarb P, Waliab SS, Hubauxa JP, Aadc I, Niemic V (2011) Meetings through the cloud: privacy-preserving scheduling on mobile devices. J Syst Softw 84(11):1910-1927. Special Issue on Mobile Applications: Status and Trends
-
(2011)
J Syst Softw
, vol.84
, Issue.11
, pp. 1910-1927
-
-
Bilogrevic, I.1
Jadliwalaa, M.2
Kumarb, P.3
Waliab, S.S.4
Hubauxa, J.P.5
Aadc, I.6
Niemic, V.7
-
17
-
-
79960576001
-
SDSM: A secure data service mechanism in mobile cloud computing
-
Shanghai, China Apr 2011
-
Jia W, Zhu H, Cao Z, Wei L, Lin X (2011) SDSM: a secure data service mechanism in mobile cloud computing. In: Proc IEEE conference on computer communications workshops (INFOCOM WKSHPS), Shanghai, China, Apr 2011
-
(2011)
Proc IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Wei, L.4
Lin, X.5
-
18
-
-
80053551895
-
Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
-
10.1016/S1007-0214(11)70070-0
-
Ren W, Yu L, Gao R, Xiong F (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. J Tsinghua Univ (Sci Technol) 16(5):520-528
-
(2011)
J Tsinghua Univ (Sci Technol)
, vol.16
, Issue.5
, pp. 520-528
-
-
Ren, W.1
Yu, L.2
Gao, R.3
Xiong, F.4
-
21
-
-
79961227180
-
Provable data possession of resource constrained mobile devices in cloud computing
-
Yang J, Wang H, Wang J, Tan C, Yu D (2011) Provable data possession of resource constrained mobile devices in cloud computing. J Netw 6(7):1033-1040
-
(2011)
J Netw
, vol.6
, Issue.7
, pp. 1033-1040
-
-
Yang, J.1
Wang, H.2
Wang, J.3
Tan, C.4
Yu, D.5
-
22
-
-
84862956001
-
Efficient and secure data storage operations for mobile cloud computing
-
Zhou Z, Huang D (2011) Efficient and secure data storage operations for mobile cloud computing. In: IACR cryptology eprint archive, p 185
-
(2011)
IACR Cryptology Eprint Archive
, pp. 185
-
-
Zhou, Z.1
Huang, D.2
-
24
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
10.1145/1127345.1127346
-
Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur 9(1):1-30
-
(2005)
ACM Trans Inf Syst Secur
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
25
-
-
84887992156
-
Re-encryption-based key management towards secure and scalable mobile applications in clouds
-
Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR cryptology eprint archive, p 668
-
(2011)
IACR Cryptology Eprint Archive
, pp. 668
-
-
Tysowski, P.K.1
Hasan, M.A.2
-
26
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
798552 10.1109/TIT.1985.1057074
-
ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469-472
-
(1985)
IEEE Trans Inf Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
28
-
-
0021409284
-
Probabilistic encryption
-
760548 10.1016/0022-0000(84)90070-9
-
Goldwasser S, Micali S (1984) Probabilistic encryption. J Comput Syst Sci 28(2):270-299
-
(1984)
J Comput Syst Sci
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
30
-
-
77953310709
-
Achieving secure scalable and fine-grained data access control in cloud computing
-
San Diego, CA, USA Mar 2010
-
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure scalable and fine-grained data access control in cloud computing. In: Proc IEEE INFOCOM (INFOCOM '10), San Diego, CA, USA, Mar 2010
-
(2010)
Proc IEEE INFOCOM (INFOCOM '10)
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
31
-
-
84888007830
-
-
Adjusting Application Performance 10 July 2012
-
Adjusting Application Performance (2012) https://developers.google.com/ appengine/docs/adminconsole/performancesettings. 10 July 2012
-
(2012)
-
-
-
32
-
-
84888011990
-
-
Code Coverage 19 June 2012
-
Code Coverage (2012) https://developers.google.com/web-toolkit/doc/ latest/DevGuideTestingCoverage. 19 June 2012
-
(2012)
-
-
-
33
-
-
84887999427
-
-
DeviceInfo API July 2012
-
DeviceInfo API (2012) http://www.blackberry.com/developers/docs/4.3.0api/ net/rim/device/api/system/DeviceInfo.html. July 2012
-
(2012)
-
-
-
34
-
-
84888013069
-
-
System.currentTimeMillis() vs. new Date() vs. Calendar.getInstance(). getTime() April 12 2013
-
System.currentTimeMillis() vs. new Date() vs. Calendar.getInstance(). getTime() (2012) http://stackoverflow.com/questions/368094/system- currenttimemillis-vs-new-date-vs-calendar-getinstance-gettime. April 12 2013
-
(2012)
-
-
|