-
1
-
-
84866668858
-
Towards secure mobile cloud computing: A survey
-
July
-
A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, "Towards Secure Mobile Cloud Computing: a Survey", Future Generation Computer Systems, vol. 29, pp. 1278-1299, July 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, pp. 1278-1299
-
-
Khan, A.N.1
Kiah, M.L.M.2
Khan, S.U.3
Madani, S.A.4
-
2
-
-
68249129760
-
-
Technical Report ucb/EECS-2009-28, EECS Department, University of California, Berkeley, Feb
-
M. Armbrust et al, "Above the Clouds: a Berkeley View of Cloud Computing", Technical Report ucb/EECS-2009-28, EECS Department, University of California, Berkeley, Feb. 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
-
3
-
-
84893390084
-
-
access data: 05 October, 2012
-
Pay-as-You-Go with Cloud Computing, http://technology.inc.com/2008/05/01/ pay-as-you-go-with-cloudcomputing/, access data: 05 October, 2012.
-
-
-
-
5
-
-
84893426225
-
Enhanced dynamic credential generation scheme for protection of user identity in mobilecloud computing
-
A. N. Khan, M. M. Kiah, S. A. Madani, and M. Ali, "Enhanced dynamic credential generation scheme for protection of user identity in mobilecloud computing", The Journal of Supercomputing, pp. 1-20, 2013.
-
(2013)
The Journal of Supercomputing
, pp. 1-20
-
-
Khan, A.N.1
Kiah, M.M.2
Madani, S.A.3
Ali, M.4
-
6
-
-
84862998994
-
Mobile cloud computing: A survey
-
January
-
N. Fernando, S. W. Loke, and W. Rahayu, "Mobile Cloud Computing: a Survey", Future Generation Computer Systems, vol. 29, pp. 84-106, January 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, pp. 84-106
-
-
Fernando, N.1
Loke, S.W.2
Rahayu, W.3
-
7
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
April
-
K. Kumar and Y. H. Lu, "Cloud Computing For Mobile Users: Can Offloading Computation Save Energy?", IEEE Journal Computer, vol. 43, pp. 51-56, April 2010.
-
(2010)
IEEE Journal Computer
, vol.43
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.H.2
-
9
-
-
78649302229
-
Cloud computing: State-of-the-art and research challenges
-
May
-
Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-of-the-art and research challenges", Journal of Internet Services and Applications, vol. 1, pp. 7-18, May 2010.
-
(2010)
Journal of Internet Services and Applications
, vol.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
-
10
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
January
-
S. Subashini and V. Kavitha, "A Survey on Security Issues in Service Delivery Models of Cloud Computing", Journal of Network and Computer Applications, vol. 34, pp. 1-11, January 2011, doi: http://dx.doi.org/10.1016/j. jnca.2010.07.006.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
11
-
-
84929445167
-
Towards trusted cloud computing
-
San Diego, CA, June
-
N. Santos, K. P. Gummadi, and R. Rodrigues, Towards Trusted Cloud Computing, in: Proc. Hot Topics in Cloud Computing (HotCloud'09), San Diego, CA, June 2009.
-
(2009)
Proc. Hot Topics in Cloud Computing (HotCloud'09)
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
12
-
-
74049110034
-
Securing elastic applications on mobile devices for cloud computing
-
November
-
X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing Elastic Applications on Mobile Devices for Cloud Computing", Proc. ACM Workshop on Cloud Computing Security (CCSW'09), pp. 127-134, November 2009.
-
(2009)
Proc. ACM Workshop on Cloud Computing Security (CCSW'09)
, pp. 127-134
-
-
Zhang, X.1
Schiffman, J.2
Gibbs, S.3
Kunjithapatham, A.4
Jeong, S.5
-
15
-
-
78650121432
-
Authentication in the clouds: A framework and its application to mobile users
-
October
-
R. Chow et al., "Authentication in the Clouds: A Framework and its Application to Mobile Users", Proc. ACM Cloud Computing Security Workshop (CCSW'10), pp. 1-6, October 2010.
-
(2010)
Proc. ACM Cloud Computing Security Workshop (CCSW'10)
, pp. 1-6
-
-
Chow, R.1
-
16
-
-
78449236807
-
MobiCloud: Building secure cloud framework for mobile computing and communication
-
June
-
D. Huan, X. Zhang, M. Kang, and J. Luo, "MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication", Proc. 5th IEEE Int. Symposium on Service Oriented System Engineering (SOSE'10), pp. 27-34, June 2010.
-
(2010)
Proc. 5th IEEE Int. Symposium on Service Oriented System Engineering (SOSE'10)
, pp. 27-34
-
-
Huan, D.1
Zhang, X.2
Kang, M.3
Luo, J.4
-
17
-
-
79960590319
-
Secure data processing framework for mobile cloud computing
-
April
-
D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong, "Secure Data Processing Framework for Mobile Cloud Computing", Proc. IEEE INFOCOM Workshop on Cloud Computing (INFOCOM'11), pp. 614-618, April 2011.
-
(2011)
Proc. IEEE INFOCOM Workshop on Cloud Computing (INFOCOM'11)
, pp. 614-618
-
-
Huang, D.1
Zhou, Z.2
Xu, L.3
Xing, T.4
Zhong, Y.5
-
19
-
-
80052758369
-
Meetings through the cloud: Privacy-preserving scheduling on mobile devices
-
November
-
I. Bilogrevica et al., "Meetings Through the Cloud: Privacy-preserving Scheduling on Mobile Devices", Journal of Systems and Software, vol. 84, pp. 1910-1927, November 2011.
-
(2011)
Journal of Systems and Software
, vol.84
, pp. 1910-1927
-
-
Bilogrevica, I.1
-
20
-
-
79960576001
-
SDSM: A secure data service mechanism in mobile cloud computing
-
April
-
W. Jia, H. Zhu, Z. Cao, L. Wei, and X. Lin, "SDSM: A Secure Data Service Mechanism in Mobile Cloud Computing", Proc. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS'11), pp. 1060-1065, April 2011.
-
(2011)
Proc. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS'11)
, pp. 1060-1065
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Wei, L.4
Lin, X.5
-
21
-
-
80053551895
-
Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
-
October
-
W. Ren, L. Yu, R. Gao, and F. Xiong, "Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing", Journal of Tsinghua Science and Technology, vol. 16, pp. 520-528, October 2011.
-
(2011)
Journal of Tsinghua Science and Technology
, vol.16
, pp. 520-528
-
-
Ren, W.1
Yu, L.2
Gao, R.3
Xiong, F.4
-
22
-
-
79952030338
-
Energy-efficient incremental integrity for securing storage in mobile cloud computing
-
December
-
W. Itani, A. Kayssi, and A. Chehab, "Energy-efficient Incremental Integrity for Securing Storage in Mobile Cloud Computing", Proc. Int. Conference on Energy Aware Computing (ICEAC'10), pp. 1-2, December 2010.
-
(2010)
Proc. Int. Conference on Energy Aware Computing (ICEAC'10)
, pp. 1-2
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
23
-
-
80052421238
-
Secure cloud storage for conventional data archive of smart phones
-
June
-
S. C. Hsueh, J. Y. Lin, and M. Y. Lin, "Secure Cloud Storage for Conventional Data Archive of Smart Phones", Proc. 15th IEEE Int. Symposium on Consumer Electronics (ISCE'11), pp. 156-161, June 2011.
-
(2011)
Proc. 15th IEEE Int. Symposium on Consumer Electronics (ISCE'11)
, pp. 156-161
-
-
Hsueh, S.C.1
Lin, J.Y.2
Lin, M.Y.3
-
24
-
-
79961227180
-
Provable data possession of resource constrained mobile devices in cloud computing
-
July
-
J. Yang, H. Wang, J. Wang, C. Tan, and D. Yu1, "Provable Data Possession of Resource Constrained Mobile Devices in Cloud Computing", Journal of Networks, vol. 6, pp. 1033-1040, July 2011.
-
(2011)
Journal of Networks
, vol.6
, pp. 1033-1040
-
-
Yang, J.1
Wang, H.2
Wang, J.3
Tan, C.4
Yu, D.5
-
25
-
-
84862956001
-
Efficient and secure data storage operations for mobile cloud computing
-
Z. Zhou and D. Huang, "Efficient and Secure Data Storage Operations for Mobile Cloud Computing", IACR Cryptology ePrint Archive, 2011.
-
(2011)
IACR Cryptology EPrint Archive
-
-
Zhou, Z.1
Huang, D.2
-
26
-
-
33745218758
-
Improved proxy reencryption schemes with applications to secure distributed storage
-
Febraury
-
G. Ateniese, K. Fu, M. Green, S. Hohenberger, "Improved proxy reencryption schemes with applications to secure distributed storage", ACM Transactions on Information and System Security, vol. 9, pp. 1-30, Febraury 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.9
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
27
-
-
84887992156
-
Re-encryption-based key management towards secure and scalable mobile applications in clouds
-
P. K. Tysowski and M. A. Hasan, "Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds", IACR Cryptology ePrint Archive 2011, vol. 668, 2011.
-
(2011)
IACR Cryptology EPrint Archive 2011
, vol.668
-
-
Tysowski, P.K.1
Hasan, M.A.2
|