-
3
-
-
84874278922
-
MAPCloud: Mobile applications on an elastic and scalable 2-tier cloud architecture
-
IEEE Computer Society, Washington, DC, USA
-
M. Reza Rahimi, Nalini Venkatasubramanian, Sharad Mehrotra, and Athanasios V. Vasilakos. 2012. MAPCloud: Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture. In Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing (UCC '12). IEEE Computer Society, Washington, DC, USA, 83-90.
-
(2012)
Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing (UCC '12)
, pp. 83-90
-
-
Reza Rahimi, M.1
Venkatasubramanian, N.2
Mehrotra, S.3
Vasilakos, A.V.4
-
5
-
-
84894446462
-
-
Date: August, by Wireless Special Interest Group (SIG) PCI Security Standards Council, last accessed: June
-
Information Supplement: PCI DSS Wireless Guidelines Standard: PCI Data Security Standard (PCI DSS) Version: 2. 0 Date: August, 2011 by Wireless Special Interest Group (SIG) PCI Security Standards Council URL: https://www. pcisecuritystandards. org/pdfs/PCI-DSS-Wireless-Guidelin e-with-WiFi-and- Bluetooth-082211. pdf, last accessed: June 2013.
-
(2011)
Information Supplement: PCI DSS Wireless Guidelines Standard: PCI Data Security Standard (PCI DSS) Version: 2. 0
-
-
-
6
-
-
84855463023
-
Executing mobile applications on the cloud: Framework and issues
-
January 2012
-
Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh, Chen-Pang Lee, and Yi-Hsiang Huang. 2012. Executing mobile applications on the cloud: Framework and issues. Comput. Math. Appl. 63, 2 (January 2012), 573-587.
-
(2012)
Comput. Math. Appl.
, vol.63
, Issue.2
, pp. 573-587
-
-
Hung, S.1
Shih, C.2
Shieh, J.3
Lee, C.4
Huang, Y.5
-
7
-
-
84866668858
-
Towards secure mobile cloud computing: A survey
-
July 2013
-
Abdul Nasir Khan, M. L. Mat Kiah, Samee U. Khan, and Sajjad A. Madani. 2013. Towards secure mobile cloud computing: A survey. Future Gener. Comput. Syst. 29, 5 (July 2013), 1278-1299.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Nasir Khan, A.1
Mat Kiah, M.L.2
Khan, S.U.3
Madani, S.A.4
-
8
-
-
84883726912
-
Security and privacy in mobile cloud computing
-
1-5 July
-
Hui Suo; Zhuohua Liu; Jiafu Wan; Keliang Zhou, "Security and privacy in mobile cloud computing," Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International, vol., no., pp. 655,659, 1-5 July 2013
-
(2013)
Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International
, pp. 655-659
-
-
Suo, H.1
Liu, Z.2
Wan, J.3
Zhou, K.4
-
9
-
-
84898809955
-
Management of identity and credentials in mobile cloud environment
-
September 28-29, Bali, Indonesia
-
Debasish Jana and Debasis Bandyopadhyay, "Management of Identity and Credentials in Mobile Cloud Environment", Proceedings of the 2013 International Conference on Advanced Computer Science and Information Systems (ICACSIS 2013), September 28-29, 2013, Bali, Indonesia
-
(2013)
Proceedings of the 2013 International Conference on Advanced Computer Science and Information Systems (ICACSIS 2013)
-
-
Jana, D.1
Bandyopadhyay, D.2
-
10
-
-
80054816611
-
Security analysis of authentication protocols for next-generation mobile and CE cloud services
-
6-8 Sept.
-
Grzonkowski, S.; Corcoran, P. M.; Coughlin, T., "Security analysis of authentication protocols for next-generation mobile and CE cloud services," Consumer Electronics-Berlin (ICCE-Berlin), 2011 IEEE International Conference on, vol., no., pp. 83,87, 6-8 Sept. 2011.
-
(2011)
Consumer Electronics-Berlin (ICCE-Berlin), 2011 IEEE International Conference on
, pp. 83-87
-
-
Grzonkowski, S.1
Corcoran, P.M.2
Coughlin, T.3
-
11
-
-
84894479960
-
-
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs, White Paper, Ping Identity Corporation, last accessed: June
-
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs, White Paper, Ping Identity Corporation, 2011, URL: http://www. innovation-district. com/wp-content/uploads/2012/04/The-Essentials-of-OAuth. pdf, last accessed: June 2013
-
(2011)
-
-
-
12
-
-
80155167231
-
A security framework of group location-based mobile applications in cloud computing
-
IEEE Computer Society, Washington, DC, USA
-
Yu-Jia Chen and Li-Chun Wang. 2011. A Security Framework of Group Location-Based Mobile Applications in Cloud Computing. In Proceedings of the 2011 40th International Conference on Parallel Processing Workshops (ICPPW '11). IEEE Computer Society, Washington, DC, USA, 184-190
-
(2011)
Proceedings of the 2011 40th International Conference on Parallel Processing Workshops (ICPPW '11)
, pp. 184-190
-
-
Chen, Y.1
Wang, L.2
-
13
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM, New York, NY, USA
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. 2009. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security (CCS '09). ACM, New York, NY, USA, 199-212.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
14
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
New York, NY, USA
-
Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, and Jesus Molina. 2009. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09). ACM, New York, NY, USA, 85-90.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW '09). ACM
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
15
-
-
84865000588
-
Thrifty privacy: Efficient support for privacypreserving publish/subscribe
-
ACM, New York, NY, USA
-
Raphael Barazzutti, Pascal Felber, Hugues Mercier, Emanuel Onica, and Etienne Riviere. 2012. Thrifty privacy: efficient support for privacypreserving publish/subscribe. In Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems (DEBS '12). ACM, New York, NY, USA, 225-236.
-
(2012)
Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems (DEBS '12)
, pp. 225-236
-
-
Barazzutti, R.1
Felber, P.2
Mercier, H.3
Onica, E.4
Riviere, E.5
-
16
-
-
84870675634
-
Privacy preserving K-Medoids clustering: An approach towards securing data in Mobile cloud architecture
-
New York, NY, USA
-
Sanjit Kumar Dash, Debi Pr. Mishra, Ranjita Mishra, and Sweta Dash. 2012. Privacy preserving K-Medoids clustering: an approach towards securing data in Mobile cloud architecture. In Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology (CCSEIT '12). ACM, New York, NY, USA, 439-443.
-
(2012)
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology (CCSEIT '12). ACM
, pp. 439-443
-
-
Kumar Dash, S.1
Debi Mishra, Pr.2
Mishra, R.3
Dash, S.4
-
17
-
-
84873449020
-
Cloudenabled privacy-preserving collaborative learning for mobile sensing
-
New York, NY, USA
-
Bin Liu, Yurong Jiang, Fei Sha, and Ramesh Govindan. 2012. Cloudenabled privacy-preserving collaborative learning for mobile sensing. In Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (SenSys '12). ACM, New York, NY, USA, 57-70.
-
(2012)
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (SenSys '12). ACM
, pp. 57-70
-
-
Liu, B.1
Jiang, Y.2
Sha, F.3
Govindan, R.4
-
18
-
-
84872074603
-
Efficient and secure data storage operations for mobile cloud computing
-
Jorge Lobo, Philippe Owezarski, and Hui Zhang (Eds. ). International Federation for Information Processing, Laxenburg, Austria, Austria
-
Zhibin Zhou and Dijiang Huang. 2012. Efficient and secure data storage operations for mobile cloud computing. In Proceedings of the 8th International Conference on Network and Service Management (CNSM '12), Jorge Lobo, Philippe Owezarski, and Hui Zhang (Eds. ). International Federation for Information Processing, Laxenburg, Austria, Austria, 37-45.
-
(2012)
Proceedings of the 8th International Conference on Network and Service Management (CNSM '12)
, pp. 37-45
-
-
Zhou, Z.1
Huang, D.2
-
19
-
-
84864263840
-
Practical privacy preserving cloud resource-payment for constrained clients
-
Simone Fischer-Hübner and Matthew Wright (Eds. ). Springer-Verlag, Berlin, Heidelberg
-
Martin Pirker, Daniel Slamanig, and Johannes Winter. 2012. Practical privacy preserving cloud resource-payment for constrained clients. In Proceedings of the 12th international conference on Privacy Enhancing Technologies (PETS'12), Simone Fischer-Hübner and Matthew Wright (Eds. ). Springer-Verlag, Berlin, Heidelberg, 201-220.
-
(2012)
Proceedings of the 12th International Conference on Privacy Enhancing Technologies (PETS'12)
, pp. 201-220
-
-
Pirker, M.1
Slamanig, D.2
Winter, J.3
-
22
-
-
79952449865
-
Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
-
April 2011
-
Chi-Yin Chow, Mohamed F. Mokbel, and Xuan Liu. 2011. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica 15, 2 (April 2011), 351-380.
-
(2011)
Geoinformatica
, vol.15
, Issue.2
, pp. 351-380
-
-
Chow, C.1
Mokbel, M.F.2
Liu, X.3
-
23
-
-
84865530894
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
October
-
Dinh, H. T., Lee, C., Niyato, D. and Wang, P., A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing. October 2011.
-
(2011)
Wireless Communications and Mobile Computing
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
24
-
-
84894476201
-
-
Ph. D. Dissertation. Wayne State University, Detroit, MI, USA. Advisor(s) Loren Schwiebert and Weisong Shi
-
Yong Xi. 2012. Location Privacy in Emerging Network-Based Applications. Ph. D. Dissertation. Wayne State University, Detroit, MI, USA. Advisor(s) Loren Schwiebert and Weisong Shi.
-
(2012)
Location Privacy in Emerging Network-Based Applications
-
-
Xi, Y.1
-
25
-
-
84883682561
-
Enabling secure location-based services in mobile cloud computing
-
ACM, New York, NY, USA
-
Yan Zhu, Di Ma, Dijiang Huang, and Changjun Hu. 2013. Enabling secure location-based services in mobile cloud computing. In Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing (MCC '13). ACM, New York, NY, USA, 27-32.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing (MCC '13)
, pp. 27-32
-
-
Zhu, Y.1
Di, M.A.2
Huang, D.3
Hu, C.4
-
26
-
-
84894410797
-
-
Prepared by the Cloud Security Alliance, last accessed: June
-
Security Guidance for Critical Areas of Focus in Cloud Computing V3. 0, Prepared by the Cloud Security Alliance, URL: https://downloads. cloudsecurityalliance. org/initiatives/guidance/csaguid e. v3. 0. pdf, last accessed: June 2013
-
(2013)
Security Guidance for Critical Areas of Focus in Cloud Computing V3. 0
-
-
-
29
-
-
84894451283
-
-
published by Cloud Security Alliance, February 2013
-
The Notorious Nine Cloud Computing Top Threats in 2013, published by Cloud Security Alliance, February 2013, URL: https://downloads. cloudsecurityalliance. org/initiatives/top-threats/The- Notorious-Nine-Cloud- Computing-Top-Threats-in-2013. pdf, last accessed: June 2013
-
(2013)
The Notorious Nine Cloud Computing Top Threats in 2013, Last Accessed: June
-
-
-
30
-
-
84878486368
-
Fiatshamir identification scheme immune to the hardware fault attacks
-
Article 65 (March 2013)
-
Sung-Kyoung Kim, Tae Hyun Kim, and Seokhie Hong. 2013. Fiatshamir identification scheme immune to the hardware fault attacks. ACM Trans. Embed. Comput. Syst. 12, 1s, Article 65 (March 2013), 11 pages
-
(2013)
ACM Trans. Embed. Comput. Syst.
, vol.12
, Issue.1 S
, pp. 11
-
-
Kim, S.1
Hyun Kim, T.2
Hong, S.3
-
31
-
-
84894471496
-
-
Cisco Identity Services Engine (ISE), CISCO, 2013, last accessed: June
-
Cisco Identity Services Engine (ISE), CISCO, 2013, URL: http://www. cisco. com/en/US/prod/collateral/vpndevc/ps5712/ps11637/p s11195/at-a-glance- c45-654884. pdf, last accessed: June 2013
-
(2013)
-
-
-
32
-
-
84855974342
-
Cloud data protection for the masses
-
January 2012
-
Dawn Song, Elaine Shi, Ian Fischer, and Umesh Shankar. 2012. Cloud Data Protection for the Masses. Computer 45, 1 (January 2012), 39-45
-
(2012)
Computer
, vol.45
, Issue.1
, pp. 39-45
-
-
Song, D.1
Shi, E.2
Fischer, I.3
Shankar, U.4
-
33
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy
-
April 2010
-
Karthik Kumar and Yung-Hsiang Lu. 2010. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?. Computer 43, 4 (April 2010), 51-56.
-
(2010)
Computer
, vol.43
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.2
-
34
-
-
84878402955
-
Pushing back the rain-how to create trustworthy services in the cloud
-
last accessed November
-
D. Bogdanov and A. Kalu. Pushing back the rain-how to create trustworthy services in the cloud. ISACA Journal, 3:49-51, 2013. Available at http://www. isaca. org/Journal/Past-Issues/2013/Volume-3/Pages/default. aspx, last accessed November 2013.
-
(2013)
ISACA Journal
, vol.3
, pp. 49-51
-
-
Bogdanov, D.1
Kalu, A.2
-
35
-
-
84878467162
-
A security framework for mobile cloud applications
-
17-19 Jan.
-
Popa, D.; Cremene, M.; Borda, M.; Boudaoud, K., "A security framework for mobile cloud applications," Roedunet International Conference (RoEduNet), 2013 11th, vol., no., pp. 1,4, 17-19 Jan. 2013.
-
(2013)
Roedunet International Conference (RoEduNet), 2013 11th
, pp. 1-4
-
-
Popa, D.1
Cremene, M.2
Borda, M.3
Boudaoud, K.4
-
36
-
-
84894486260
-
-
Payment Card Industry (PCI) Hardware Security Module (HSM)-Security Requirement V 1. 0, whitepaper on security solutions published by PCI Security Standards Council, April 2009. Last Accessed: August
-
Payment Card Industry (PCI) Hardware Security Module (HSM)-Security Requirement V 1. 0, whitepaper on security solutions published by PCI Security Standards Council, April 2009. URL: https://www. pcisecuritystandards. org/documents/PCI%20HSM%20Eval %20Vendor%20Questionnaire%201. 0%20final. pdf. Last Accessed: August 2013.
-
(2013)
-
-
|