메뉴 건너뛰기




Volumn 68, Issue , 2015, Pages 61-72

Robust access control framework for mobile cloud computing network

Author keywords

Access control; Attributes; Cloud computing; Encryption; Smart devices

Indexed keywords

4G MOBILE COMMUNICATION SYSTEMS; ACCESS CONTROL; CLOUD COMPUTING; CRYPTOGRAPHY; DATA SHARING; EFFICIENCY; MOBILE CLOUD COMPUTING; NETWORK PROTOCOLS; PERSONNEL;

EID: 84941881096     PISSN: 01403664     EISSN: 1873703X     Source Type: Journal    
DOI: 10.1016/j.comcom.2015.07.005     Document Type: Article
Times cited : (35)

References (47)
  • 7
    • 85015437589 scopus 로고    scopus 로고
    • LRBAC: A location-aware role-based access control model.
    • Springer Berlin Heidelberg
    • I. Ray, M. Kumar, and L. Yu LRBAC: a location-aware role-based access control model. Information Systems Security 2006 Springer Berlin Heidelberg 147 161
    • (2006) Information Systems Security , pp. 147-161
    • Ray, I.1    Kumar, M.2    Yu, L.3
  • 14
    • 84941879344 scopus 로고    scopus 로고
    • Cisco Study: IT Saying Yes to BYOD, Cisco, May 2012 (accessed on 15 July 2015)
    • Cisco Study: IT Saying Yes to BYOD, Cisco, http://tinyurl.com/d8fv2uj, May 2012 (accessed on 15 July 2015).
  • 15
    • 84867375385 scopus 로고    scopus 로고
    • BYOD: Security and privacy considerations
    • K.W. Miller, J. Voas, and G.F. Hurlburt BYOD: security and privacy considerations IT Prof. 14 5 2012 53 55
    • (2012) IT Prof. , vol.14 , Issue.5 , pp. 53-55
    • Miller, K.W.1    Voas, J.2    Hurlburt, G.F.3
  • 16
    • 84857696369 scopus 로고    scopus 로고
    • BYOD: Enabling the chaos
    • G. Thomson BYOD: Enabling the chaos Net. Secur. 2012 2 2012 5 8
    • (2012) Net. Secur. , vol.2012 , Issue.2 , pp. 5-8
    • Thomson, G.1
  • 19
    • 41549105875 scopus 로고    scopus 로고
    • A new data encryption algorithm based on the location of mobile users
    • L. Hsien-Chou, and C. Yun-Hsiang A new data encryption algorithm based on the location of mobile users Inf. Technol. J. 7 1 2008 63 69
    • (2008) Inf. Technol. J. , vol.7 , Issue.1 , pp. 63-69
    • Hsien-Chou, L.1    Yun-Hsiang, C.2
  • 21
    • 77950340694 scopus 로고    scopus 로고
    • Secure localization using elliptic curve cryptography in wireless sensor networks
    • V. Vijayalakshmi, and T.G. Palanivelu Secure localization using elliptic curve cryptography in wireless sensor networks Int. J. Comp. Sci. Netw. Secur. 8 6 2008 255 261
    • (2008) Int. J. Comp. Sci. Netw. Secur. , vol.8 , Issue.6 , pp. 255-261
    • Vijayalakshmi, V.1    Palanivelu, T.G.2
  • 27
    • 33645311516 scopus 로고    scopus 로고
    • Reality mining: Sensing complex social systems
    • N. Eagle, and A.S. Pentland Reality mining: sensing complex social systems J. Pers. Ubiquitous Comput. 10 4 2006 255 268
    • (2006) J. Pers. Ubiquitous Comput. , vol.10 , Issue.4 , pp. 255-268
    • Eagle, N.1    Pentland, A.S.2
  • 29
    • 84941881166 scopus 로고    scopus 로고
    • Samsung KNOX, (accessed on 15 July 2015)
    • Samsung KNOX, http://tinyurl.com/me93jcv (accessed on 15 July 2015).
  • 30
    • 84941874750 scopus 로고    scopus 로고
    • BlackBerry BES12, (accessed on 15 July 2015)
    • BlackBerry BES12, http://tinyurl.com/ls3yxh8 (accessed on 15 July 2015).
  • 33
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • Springer
    • A.B. Lewko, and B. Waters Decentralizing attribute-based encryption EUROCRYPT, Ser. LNCS vol. 6632 2011 Springer 568 588
    • (2011) EUROCRYPT, Ser. LNCS , vol.6632 , pp. 568-588
    • Lewko, A.B.1    Waters, B.2
  • 36
    • 84941876608 scopus 로고    scopus 로고
    • The Java Pairing-Based Cryptography Library (JPBC), (accessed on 15 July 2015)
    • The Java Pairing-Based Cryptography Library (JPBC), http://tinyurl.com/ll2p39t (accessed on 15 July 2015).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.