-
1
-
-
84866668858
-
Towards secure mobile cloud computing: a survey
-
Khan AN et al (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299
-
(2013)
Future Gener Comput Syst
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
-
2
-
-
84894666247
-
A survey of mobile cloud computing application models
-
Khan A et al (2013) A survey of mobile cloud computing application models. IEEE Commun Surv Tutor 16(1):393–413
-
(2013)
IEEE Commun Surv Tutor
, vol.16
, Issue.1
, pp. 393-413
-
-
Khan, A.1
-
3
-
-
77951039985
-
Cloud computing for mobile users: can offloading computation save energy?
-
Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43(4):51–56
-
(2010)
Computer
, vol.43
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.H.2
-
5
-
-
84901983571
-
Taxonomy of the security aspects of cloud computing systems—a survey
-
Hashemi SM, Ardakani MRM (2012) Taxonomy of the security aspects of cloud computing systems—a survey. Int J Appl Inf Syst 4(1):21–28
-
(2012)
Int J Appl Inf Syst
, vol.4
, Issue.1
, pp. 21-28
-
-
Hashemi, S.M.1
Ardakani, M.R.M.2
-
6
-
-
84919878265
-
-
Juniper (2010) Technical report: Mobile cloud computing: 9.5 billion by 2014. Accessed 24 April 2013
-
Juniper (2010) Technical report: Mobile cloud computing: 9.5 billion by 2014. http://www.juniperresearch.com/reports/mobile_cloud_applications_and_services. Accessed 24 April 2013
-
-
-
-
7
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
8
-
-
84929445167
-
Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing
-
Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. USENIX Association
-
(2009)
USENIX Association
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
9
-
-
84888011760
-
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
-
Khan AN et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706
-
(2013)
J Supercomput
, vol.66
, Issue.3
, pp. 1687-1706
-
-
Khan, A.N.1
-
11
-
-
84901987724
-
Incremental proxy re-encryption scheme for mobile cloud computing environment
-
Khan AN et al (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651
-
(2014)
J Supercomput
, vol.68
, Issue.2
, pp. 624-651
-
-
Khan, A.N.1
-
12
-
-
80053551895
-
Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
-
Ren W et al (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. Tsinghua Sci Technol 16(5):520–528
-
(2011)
Tsinghua Sci Technol
, vol.16
, Issue.5
, pp. 520-528
-
-
Ren, W.1
-
16
-
-
78449236807
-
MobiCloud: building secure cloud framework for mobile computing and communication. In: 5th IEEE international symposium on service oriented system engineering (SOSE ’10)
-
Huang D et al (2010) MobiCloud: building secure cloud framework for mobile computing and communication. In: 5th IEEE international symposium on service oriented system engineering (SOSE ’10), pp 27–34
-
(2010)
pp 27–34
-
-
Huang, D.1
-
17
-
-
79960590319
-
Secure data processing framework for mobile cloud computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS ‘11)
-
Huang D et al (2011) Secure data processing framework for mobile cloud computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS ‘11), pp 614–618
-
(2011)
pp 614–618
-
-
Huang, D.1
-
19
-
-
80052758369
-
Meetings through the cloud: privacy-preserving scheduling on mobile devices
-
Bilogrevic I et al (2011) Meetings through the cloud: privacy-preserving scheduling on mobile devices. J Syst Softw 84(11):1910–1927
-
(2011)
J Syst Softw
, vol.84
, Issue.11
, pp. 1910-1927
-
-
Bilogrevic, I.1
-
20
-
-
79952030338
-
Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing
-
IEEE, Cairo:
-
Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International conference on energy aware computing (ICEAC ’10), IEEE, Cairo, pp 1–2
-
International conference on energy aware computing (ICEAC ’10)
, pp. 1-2
-
-
Itani, W.1
Kayssi, A.2
-
21
-
-
80052421238
-
Secure cloud storage for convenient data archive of smart phones. In: IEEE 15th international symposium on consumer electronics (ISCE ’11)
-
Hsueh SC, Lin JY, Lin MY (2011) Secure cloud storage for convenient data archive of smart phones. In: IEEE 15th international symposium on consumer electronics (ISCE ’11), pp 156–161
-
(2011)
pp 156–161
-
-
Hsueh, S.C.1
Lin, J.Y.2
Lin, M.Y.3
-
22
-
-
79961227180
-
Provable data possession of resource-constrained mobile devices in cloud computing
-
Yang J et al (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Netw 6(7):1033–1040
-
(2011)
J Netw
, vol.6
, Issue.7
, pp. 1033-1040
-
-
Yang, J.1
-
24
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE, NJ:
-
Yu S et al (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings IEEE (INFOCOM ’10) 2010. IEEE, NJ, pp 1–9
-
(2010)
Proceedings IEEE (INFOCOM ’10)
, vol.2010
, pp. 1-9
-
-
Yu, S.1
-
25
-
-
77952322035
-
CCA-secure proxy re-encryption without pairings
-
Shao J, Cao Z (2009) CCA-secure proxy re-encryption without pairings. Public Key Cryptogr PKC 2009:357–376
-
(2009)
Public Key Cryptogr PKC
, vol.2009
, pp. 357-376
-
-
Shao, J.1
Cao, Z.2
-
26
-
-
84919877635
-
Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR cryptology eprint archive
-
Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR cryptology eprint archive, vol 668
-
(2011)
vol 668
-
-
Tysowski, P.K.1
Hasan, M.A.2
-
27
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese G et al (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1–30
-
(2006)
ACM Trans Inf Syst Secur (TISSEC)
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
-
29
-
-
38049019206
-
Key establishment scheme for sensor networks with low communication cost
-
Kim Y et al (2007) Key establishment scheme for sensor networks with low communication cost. Auton Trust Comput 441–448
-
(2007)
Auton Trust Comput
, pp. 441-448
-
-
Kim, Y.1
-
31
-
-
83255188622
-
Enhanced switched network sniffer detection technique based on IP packet routing
-
Khan AN, Qureshi K, Khan S (2009) Enhanced switched network sniffer detection technique based on IP packet routing. Inf Secur J Glob Perspect 18(4):153–162
-
(2009)
Inf Secur J Glob Perspect
, vol.18
, Issue.4
, pp. 153-162
-
-
Khan, A.N.1
Qureshi, K.2
Khan, S.3
-
32
-
-
84919878256
-
-
Remote API for Java (2012). Accessed 12 August 2012
-
Remote API for Java (2012) https://developers.google.com/appengine/docs/java/tools/remoteapiConfiguring_Remote_API_on_an_App_Engine_Client. Accessed 12 August 2012
-
-
-
-
33
-
-
84919878255
-
-
Google Cloud Storage Java API Overview (2012). Accessed 15 August 2012
-
Google Cloud Storage Java API Overview (2012) https://developers.google.com/appengine/docs/java/googlestorage/overview. Accessed 15 August 2012
-
-
-
-
34
-
-
84919878254
-
-
DeviceInfo API (2012). Accessed 02 April 2012
-
DeviceInfo API (2012) http://www.blackberry.com/developers/docs/4.3.0api/net/rim/device/api/system/DeviceInfo.html. http://www.salesforce.com/us/developer/docs/apexcode/index.htm Accessed 02 April 2012
-
-
-
-
35
-
-
0024645936
-
Petri nets: properties, analysis and applications
-
Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541–580
-
(1989)
Proc IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
36
-
-
70649083043
-
Bjørner N (2009) Satisfiability modulo theories: an appetizer
-
Springer, New York:
-
de Moura L, Bjørner N (2009) Satisfiability modulo theories: an appetizer. In: Formal methods: foundations and applications. Springer, New York, pp 23–36
-
Formal methods: foundations and applications
, pp. 23-36
-
-
de Moura, L.1
|