메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Efficient management of security and privacy issues in mobile cloud environment

Author keywords

AAA Vulnarebilities; Cloud Computing; Mobile Cloud Computing; SecaaS; STRIDE

Indexed keywords


EID: 84894461122     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INDCON.2013.6726077     Document Type: Conference Paper
Times cited : (9)

References (36)
  • 5
    • 84894446462 scopus 로고    scopus 로고
    • Date: August, by Wireless Special Interest Group (SIG) PCI Security Standards Council, last accessed: June
    • Information Supplement: PCI DSS Wireless Guidelines Standard: PCI Data Security Standard (PCI DSS) Version: 2. 0 Date: August, 2011 by Wireless Special Interest Group (SIG) PCI Security Standards Council URL: https://www. pcisecuritystandards. org/pdfs/PCI-DSS-Wireless-Guidelin e-with-WiFi-and- Bluetooth-082211. pdf, last accessed: June 2013.
    • (2011) Information Supplement: PCI DSS Wireless Guidelines Standard: PCI Data Security Standard (PCI DSS) Version: 2. 0
  • 6
    • 84855463023 scopus 로고    scopus 로고
    • Executing mobile applications on the cloud: Framework and issues
    • January 2012
    • Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh, Chen-Pang Lee, and Yi-Hsiang Huang. 2012. Executing mobile applications on the cloud: Framework and issues. Comput. Math. Appl. 63, 2 (January 2012), 573-587.
    • (2012) Comput. Math. Appl. , vol.63 , Issue.2 , pp. 573-587
    • Hung, S.1    Shih, C.2    Shieh, J.3    Lee, C.4    Huang, Y.5
  • 11
    • 84894479960 scopus 로고    scopus 로고
    • The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs, White Paper, Ping Identity Corporation, last accessed: June
    • The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs, White Paper, Ping Identity Corporation, 2011, URL: http://www. innovation-district. com/wp-content/uploads/2012/04/The-Essentials-of-OAuth. pdf, last accessed: June 2013
    • (2011)
  • 18
    • 84872074603 scopus 로고    scopus 로고
    • Efficient and secure data storage operations for mobile cloud computing
    • Jorge Lobo, Philippe Owezarski, and Hui Zhang (Eds. ). International Federation for Information Processing, Laxenburg, Austria, Austria
    • Zhibin Zhou and Dijiang Huang. 2012. Efficient and secure data storage operations for mobile cloud computing. In Proceedings of the 8th International Conference on Network and Service Management (CNSM '12), Jorge Lobo, Philippe Owezarski, and Hui Zhang (Eds. ). International Federation for Information Processing, Laxenburg, Austria, Austria, 37-45.
    • (2012) Proceedings of the 8th International Conference on Network and Service Management (CNSM '12) , pp. 37-45
    • Zhou, Z.1    Huang, D.2
  • 19
    • 84864263840 scopus 로고    scopus 로고
    • Practical privacy preserving cloud resource-payment for constrained clients
    • Simone Fischer-Hübner and Matthew Wright (Eds. ). Springer-Verlag, Berlin, Heidelberg
    • Martin Pirker, Daniel Slamanig, and Johannes Winter. 2012. Practical privacy preserving cloud resource-payment for constrained clients. In Proceedings of the 12th international conference on Privacy Enhancing Technologies (PETS'12), Simone Fischer-Hübner and Matthew Wright (Eds. ). Springer-Verlag, Berlin, Heidelberg, 201-220.
    • (2012) Proceedings of the 12th International Conference on Privacy Enhancing Technologies (PETS'12) , pp. 201-220
    • Pirker, M.1    Slamanig, D.2    Winter, J.3
  • 22
    • 79952449865 scopus 로고    scopus 로고
    • Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
    • April 2011
    • Chi-Yin Chow, Mohamed F. Mokbel, and Xuan Liu. 2011. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica 15, 2 (April 2011), 351-380.
    • (2011) Geoinformatica , vol.15 , Issue.2 , pp. 351-380
    • Chow, C.1    Mokbel, M.F.2    Liu, X.3
  • 24
    • 84894476201 scopus 로고    scopus 로고
    • Ph. D. Dissertation. Wayne State University, Detroit, MI, USA. Advisor(s) Loren Schwiebert and Weisong Shi
    • Yong Xi. 2012. Location Privacy in Emerging Network-Based Applications. Ph. D. Dissertation. Wayne State University, Detroit, MI, USA. Advisor(s) Loren Schwiebert and Weisong Shi.
    • (2012) Location Privacy in Emerging Network-Based Applications
    • Xi, Y.1
  • 26
    • 84894410797 scopus 로고    scopus 로고
    • Prepared by the Cloud Security Alliance, last accessed: June
    • Security Guidance for Critical Areas of Focus in Cloud Computing V3. 0, Prepared by the Cloud Security Alliance, URL: https://downloads. cloudsecurityalliance. org/initiatives/guidance/csaguid e. v3. 0. pdf, last accessed: June 2013
    • (2013) Security Guidance for Critical Areas of Focus in Cloud Computing V3. 0
  • 29
    • 84894451283 scopus 로고    scopus 로고
    • published by Cloud Security Alliance, February 2013
    • The Notorious Nine Cloud Computing Top Threats in 2013, published by Cloud Security Alliance, February 2013, URL: https://downloads. cloudsecurityalliance. org/initiatives/top-threats/The- Notorious-Nine-Cloud- Computing-Top-Threats-in-2013. pdf, last accessed: June 2013
    • (2013) The Notorious Nine Cloud Computing Top Threats in 2013, Last Accessed: June
  • 30
    • 84878486368 scopus 로고    scopus 로고
    • Fiatshamir identification scheme immune to the hardware fault attacks
    • Article 65 (March 2013)
    • Sung-Kyoung Kim, Tae Hyun Kim, and Seokhie Hong. 2013. Fiatshamir identification scheme immune to the hardware fault attacks. ACM Trans. Embed. Comput. Syst. 12, 1s, Article 65 (March 2013), 11 pages
    • (2013) ACM Trans. Embed. Comput. Syst. , vol.12 , Issue.1 S , pp. 11
    • Kim, S.1    Hyun Kim, T.2    Hong, S.3
  • 31
    • 84894471496 scopus 로고    scopus 로고
    • Cisco Identity Services Engine (ISE), CISCO, 2013, last accessed: June
    • Cisco Identity Services Engine (ISE), CISCO, 2013, URL: http://www. cisco. com/en/US/prod/collateral/vpndevc/ps5712/ps11637/p s11195/at-a-glance- c45-654884. pdf, last accessed: June 2013
    • (2013)
  • 32
    • 84855974342 scopus 로고    scopus 로고
    • Cloud data protection for the masses
    • January 2012
    • Dawn Song, Elaine Shi, Ian Fischer, and Umesh Shankar. 2012. Cloud Data Protection for the Masses. Computer 45, 1 (January 2012), 39-45
    • (2012) Computer , vol.45 , Issue.1 , pp. 39-45
    • Song, D.1    Shi, E.2    Fischer, I.3    Shankar, U.4
  • 33
    • 77951039985 scopus 로고    scopus 로고
    • Cloud computing for mobile users: Can offloading computation save energy
    • April 2010
    • Karthik Kumar and Yung-Hsiang Lu. 2010. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?. Computer 43, 4 (April 2010), 51-56.
    • (2010) Computer , vol.43 , Issue.4 , pp. 51-56
    • Kumar, K.1    Lu, Y.2
  • 34
    • 84878402955 scopus 로고    scopus 로고
    • Pushing back the rain-how to create trustworthy services in the cloud
    • last accessed November
    • D. Bogdanov and A. Kalu. Pushing back the rain-how to create trustworthy services in the cloud. ISACA Journal, 3:49-51, 2013. Available at http://www. isaca. org/Journal/Past-Issues/2013/Volume-3/Pages/default. aspx, last accessed November 2013.
    • (2013) ISACA Journal , vol.3 , pp. 49-51
    • Bogdanov, D.1    Kalu, A.2
  • 36
    • 84894486260 scopus 로고    scopus 로고
    • Payment Card Industry (PCI) Hardware Security Module (HSM)-Security Requirement V 1. 0, whitepaper on security solutions published by PCI Security Standards Council, April 2009. Last Accessed: August
    • Payment Card Industry (PCI) Hardware Security Module (HSM)-Security Requirement V 1. 0, whitepaper on security solutions published by PCI Security Standards Council, April 2009. URL: https://www. pcisecuritystandards. org/documents/PCI%20HSM%20Eval %20Vendor%20Questionnaire%201. 0%20final. pdf. Last Accessed: August 2013.
    • (2013)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.