-
1
-
-
85029662988
-
-
National Institute of Standards and Technology, The NIST Definition of Cloud Computing, SP 800-145,, [Online; accessed 15.09.16].
-
National Institute of Standards and Technology, The NIST Definition of Cloud Computing, SP 800-145, 2011. http://csrc.nist.gov/publications/PubsSPs.html#800-145 [Online; accessed 15.09.16].
-
(2011)
-
-
-
2
-
-
85029644731
-
-
International Data Corporation, IDC, Worldwide Public Cloud Services Spending Forecast to Double by 2019, According to IDC,, [Online; accessed 15.09.16].
-
International Data Corporation, IDC, Worldwide Public Cloud Services Spending Forecast to Double by 2019, According to IDC, 2016. https://www.idc.com/getdoc.jsp?containerId=prUS40960516 [Online; accessed 15.09.16].
-
(2016)
-
-
-
3
-
-
84960116587
-
A brief history of cloud offload: A personal journey from Odyssey through cyber foraging to cloudlets
-
Satyanarayanan, M., A brief history of cloud offload: A personal journey from Odyssey through cyber foraging to cloudlets. Mob. Comput. Commun. 18:4 (2015), 19–23, 10.1145/2721914.2721921.
-
(2015)
Mob. Comput. Commun.
, vol.18
, Issue.4
, pp. 19-23
-
-
Satyanarayanan, M.1
-
4
-
-
84996757871
-
Finding your way in the fog: Towards a comprehensive definition of fog computing
-
Vaquero, L.M., Rodero-Merino, L., Finding your way in the fog: Towards a comprehensive definition of fog computing. SIGCOMM Comput. Commun. Rev. 44:5 (2014), 27–32, 10.1145/2677046.2677052.
-
(2014)
SIGCOMM Comput. Commun. Rev.
, vol.44
, Issue.5
, pp. 27-32
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
-
5
-
-
84968402194
-
Mobile edge computing: Challenges for future virtual network embedding algorithms
-
M.T. Beck, M. Maier, Mobile edge computing: Challenges for future virtual network embedding algorithms, in: Proceedings of the 8th International Conference on Advanced Engineering Computing and Applications in Sciences, ADVCOMP, 2014, pp. 65–70.
-
(2014)
Proceedings of the 8th International Conference on Advanced Engineering Computing and Applications in Sciences, ADVCOMP
, pp. 65-70
-
-
Beck, M.T.1
Maier, M.2
-
6
-
-
84925494226
-
A survey of mobile cloud computing applications: Perspectives and challenges
-
Wang, Y., Chen, I.-R., Wang, D.-C., A survey of mobile cloud computing applications: Perspectives and challenges. Wirel. Pers. Commun. 80:4 (2015), 1607–1623, 10.1007/s11277-014-2102-7.
-
(2015)
Wirel. Pers. Commun.
, vol.80
, Issue.4
, pp. 1607-1623
-
-
Wang, Y.1
Chen, I.-R.2
Wang, D.-C.3
-
7
-
-
85084160694
-
The case for the superfluid cloud
-
Proceedings of the 7th USENIX Conference on Hot Topics in Cloud Computing, HotCloud, 2015, pp. 1–6. URL
-
F. Manco, J. Martins, K. Yasukata, J. Mendes, S. Kuenzer, F. Huici, The case for the superfluid cloud, in: Proceedings of the 7th USENIX Conference on Hot Topics in Cloud Computing, HotCloud, 2015, pp. 1–6. URL http://dl.acm.org/citation.cfm?id=2827719.2827726.
-
-
-
Manco, F.1
Martins, J.2
Yasukata, K.3
Mendes, J.4
Kuenzer, S.5
Huici, F.6
-
8
-
-
84977268028
-
Edge-centric Computing: Vision and challenges
-
Garcia Lopez, P., Montresor, A., Epema, D., Datta, A., Higashino, T., Iamnitchi, A., Barcellos, M., Felber, P., Riviere, E., Edge-centric Computing: Vision and challenges. SIGCOMM Comput. Commun. Rev. 45:5 (2015), 37–42, 10.1145/2831347.2831354.
-
(2015)
SIGCOMM Comput. Commun. Rev.
, vol.45
, Issue.5
, pp. 37-42
-
-
Garcia Lopez, P.1
Montresor, A.2
Epema, D.3
Datta, A.4
Higashino, T.5
Iamnitchi, A.6
Barcellos, M.7
Felber, P.8
Riviere, E.9
-
9
-
-
85029615822
-
-
OPENi Consortium, Deliverable 2.3 - Security and Privacy Considerations for Cloud-based Services and Cloudlets,, [Online; accessed 15.09.16].
-
OPENi Consortium, Deliverable 2.3 - Security and Privacy Considerations for Cloud-based Services and Cloudlets, 2013. http://www.openi-ict.eu/deliverables/ [Online; accessed 15.09.16].
-
(2013)
-
-
-
10
-
-
84883726912
-
Security and privacy in mobile cloud computing
-
Proceedings of the 9th International Wireless Communications and Mobile Computing Conference, IWCMC, 2013, pp. 655–659.
-
H. Suo, Z. Liu, J. Wan, K. Zhou, Security and privacy in mobile cloud computing, in: Proceedings of the 9th International Wireless Communications and Mobile Computing Conference, IWCMC, 2013, pp. 655–659. http://dx.doi.org/10.1109/IWCMC.2013.6583635.
-
-
-
Suo, H.1
Liu, Z.2
Wan, J.3
Zhou, K.4
-
11
-
-
84945364680
-
Mobile cloud computing and its security and privacy challenges
-
IGI Global
-
Takabi, H., Zargar, S.T., Joshi, J.B.D., Mobile cloud computing and its security and privacy challenges. Cloud Technology: Concepts, Methodologies, Tools, and Applications, 2015, IGI Global, 1561–1584, 10.4018/978-1-4666-6539-2.ch073.
-
(2015)
Cloud Technology: Concepts, Methodologies, Tools, and Applications
, pp. 1561-1584
-
-
Takabi, H.1
Zargar, S.T.2
Joshi, J.B.D.3
-
12
-
-
84928596525
-
An overview of fog computing and its security issues
-
Stojmenovic, I., Wen, S., Huang, X., Luan, H., An overview of fog computing and its security issues. Concurr. Comput.: Pract. Exper. 28:10 (2016), 2991–3005.
-
(2016)
Concurr. Comput.: Pract. Exper.
, vol.28
, Issue.10
, pp. 2991-3005
-
-
Stojmenovic, I.1
Wen, S.2
Huang, X.3
Luan, H.4
-
13
-
-
84961877275
-
On security and privacy issues of fog computing supported Internet of things environment
-
Proceedings of the 6th International Conference on the Network of the Future, NOF, 2015, pp. 1–3.
-
K. Lee, D. Kim, D. Ha, U. Rajput, H. Oh, On security and privacy issues of fog computing supported Internet of things environment, in: Proceedings of the 6th International Conference on the Network of the Future, NOF, 2015, pp. 1–3. http://dx.doi.org/10.1109/NOF.2015.7333287.
-
-
-
Lee, K.1
Kim, D.2
Ha, D.3
Rajput, U.4
Oh, H.5
-
14
-
-
84943612463
-
Security and privacy issues of fog computing: A survey
-
K. Xu H. Zhu Springer International Publishing
-
Yi, S., Qin, Z., Li, Q., Security and privacy issues of fog computing: A survey. Xu, K., Zhu, H., (eds.) Wireless Algorithms, Systems, and Applications Lecture Notes in Computer Science, vol. 9204, 2015, Springer International Publishing, 685–695, 10.1007/978-3-319-21837-3_67.
-
(2015)
Wireless Algorithms, Systems, and Applications, Lecture Notes in Computer Science
, vol.9204
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
15
-
-
85029667190
-
-
Yucianga Ltd, Open Fog Computing and Mobile Edge Cloud Gain Momentum,, [Online; accessed 15.09.16].
-
Yucianga Ltd, Open Fog Computing and Mobile Edge Cloud Gain Momentum, 2015. http://yucianga.info/?p=938 [Online; accessed 15.09.16].
-
(2015)
-
-
-
16
-
-
84912130127
-
The fog computing paradigm: Scenarios and security issues
-
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, FedCSIS, 2014, pp. 1–8.
-
I. Stojmenovic, S. Wen, The fog computing paradigm: Scenarios and security issues, in: Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, FedCSIS, 2014, pp. 1–8. http://dx.doi.org/10.15439/2014F503.
-
-
-
Stojmenovic, I.1
Wen, S.2
-
17
-
-
84962076525
-
Fog computing: Issues and challenges in security and forensics
-
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, COMPSAC, Vol. 3, 2015, pp. 53–59.
-
Y. Wang, T. Uehara, R. Sasaki, Fog computing: Issues and challenges in security and forensics, in: Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, COMPSAC, Vol. 3, 2015, pp. 53–59. http://dx.doi.org/10.1109/COMPSAC.2015.173.
-
-
-
Wang, Y.1
Uehara, T.2
Sasaki, R.3
-
18
-
-
84866627419
-
Fog computing and its role in the Internet of things
-
Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing, 2012, pp. 13–16.
-
F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the Internet of things, in: Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing, 2012, pp. 13–16. http://dx.doi.org/10.1145/2342509.2342513.
-
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
19
-
-
84925450955
-
Fog computing: A platform for Internet of things and analytics
-
N. Bessis C. Dobre Springer International Publishing
-
Bonomi, F., Milito, R., Natarajan, P., Zhu, J., Fog computing: A platform for Internet of things and analytics. Bessis, N., Dobre, C., (eds.) Big Data and Internet of Things: A Roadmap for Smart Environments Studies in Computational Intelligence, vol. 546, 2014, Springer International Publishing, 169–186, 10.1007/978-3-319-05029-4_7.
-
(2014)
Big Data and Internet of Things: A Roadmap for Smart Environments, Studies in Computational Intelligence
, vol.546
, pp. 169-186
-
-
Bonomi, F.1
Milito, R.2
Natarajan, P.3
Zhu, J.4
-
20
-
-
84951050684
-
A survey of fog computing: Concepts, applications and issues
-
Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata, 2015, pp. 37–42.
-
S. Yi, C. Li, Q. Li, A survey of fog computing: Concepts, applications and issues, in: Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata, 2015, pp. 37–42. http://dx.doi.org/10.1145/2757384.2757397.
-
-
-
Yi, S.1
Li, C.2
Li, Q.3
-
21
-
-
85029619858
-
-
arXiv:1502.01815, Fog computing: Focusing on mobile users at the edge. Preprint, available online.
-
T.H. Luan, L. Gao, Z. Li, Y. Xiang, L. Sun, Fog computing: Focusing on mobile users at the edge. Preprint, available online arXiv:1502.01815.
-
-
-
Luan, T.H.1
Gao, L.2
Li, Z.3
Xiang, Y.4
Sun, L.5
-
22
-
-
84908631947
-
-
S. Rodriguez Mendez, C.E. Chung, Y.T. Wang, T. Mullen, T.P. Jung, Augmented brain computer interaction based on fog computing and linked data, in: Proceedings of the International Conference on Intelligent Environments, IE, 2014, pp. 374–377.
-
J. Zao, T.T. Gan, C.K. You, S. Rodriguez Mendez, C.E. Chung, Y.T. Wang, T. Mullen, T.P. Jung, Augmented brain computer interaction based on fog computing and linked data, in: Proceedings of the International Conference on Intelligent Environments, IE, 2014, pp. 374–377. http://dx.doi.org/10.1109/IE.2014.54.
-
-
-
Zao, J.1
Gan, T.T.2
You, C.K.3
-
23
-
-
84903125253
-
Towards wearable cognitive assistance
-
Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys, 2014, pp. 68–81.
-
K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, M. Satyanarayanan, Towards wearable cognitive assistance, in: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys, 2014, pp. 68–81. http://dx.doi.org/10.1145/2594368.2594383.
-
-
-
Ha, K.1
Chen, Z.2
Hu, W.3
Richter, W.4
Pillai, P.5
Satyanarayanan, M.6
-
24
-
-
84923117513
-
Fog computing: A cloud to the ground support for smart things and machine-to-machine networks
-
Proceedings of the 2014 Australasian Telecommunication Networks and Applications Conference, ATNAC, 2014, pp. 117–122.
-
I. Stojmenovic, Fog computing: A cloud to the ground support for smart things and machine-to-machine networks, in: Proceedings of the 2014 Australasian Telecommunication Networks and Applications Conference, ATNAC, 2014, pp. 117–122. http://dx.doi.org/10.1109/ATNAC.2014.7020884.
-
-
-
Stojmenovic, I.1
-
25
-
-
84940980355
-
Steiner tree based optimal resource caching scheme in fog computing
-
Jingtao, S., Fuhong, L., Xianwei, Z., Xing, L., Steiner tree based optimal resource caching scheme in fog computing. China Commun. 12:8 (2015), 161–168, 10.1109/CC.2015.7224698.
-
(2015)
China Commun.
, vol.12
, Issue.8
, pp. 161-168
-
-
Jingtao, S.1
Fuhong, L.2
Xianwei, Z.3
Xing, L.4
-
26
-
-
84957600748
-
A shared parking model in vehicular network using fog and cloud environment
-
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2015, pp. 321–326.
-
O.T.T. Kim, N.D. Tri, V.D. Nguyen, N. Tran, C.S. Hong, A shared parking model in vehicular network using fog and cloud environment, in: Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2015, pp. 321–326. http://dx.doi.org/10.1109/APNOMS.2015.7275447.
-
-
-
Kim, O.T.T.1
Tri, N.D.2
Nguyen, V.D.3
Tran, N.4
Hong, C.S.5
-
27
-
-
85029615364
-
-
Open Fog Consortium, [Online; accessed 15.09.16].
-
Open Fog Consortium, http://www.openfogconsortium.org/ [Online; accessed 15.09.16].
-
-
-
-
28
-
-
84939158550
-
A context-based future network infrastructure for IoT services
-
Chin, W.S., soo Kim, H., Heo, Y.J., Jang, J.W., A context-based future network infrastructure for IoT services. Procedia Comput. Sci. 56 (2015), 266–270, 10.1016/j.procs.2015.07.207.
-
(2015)
Procedia Comput. Sci.
, vol.56
, pp. 266-270
-
-
Chin, W.S.1
soo Kim, H.2
Heo, Y.J.3
Jang, J.W.4
-
29
-
-
84953311242
-
Fog computing architecture to enable consumer centric Internet of things services
-
Proceedings of the 2015 IEEE International Symposium on Consumer Electronics, ISCE, 2015, pp. 1–2.
-
S. Datta, C. Bonnet, J. Haerri, Fog computing architecture to enable consumer centric Internet of things services, in: Proceedings of the 2015 IEEE International Symposium on Consumer Electronics, ISCE, 2015, pp. 1–2. http://dx.doi.org/10.1109/ISCE.2015.7177778.
-
-
-
Datta, S.1
Bonnet, C.2
Haerri, J.3
-
30
-
-
84930672512
-
A cloud visitation platform to facilitate cloud federation and fog computing
-
Zhanikeev, M., A cloud visitation platform to facilitate cloud federation and fog computing. Computer 48:5 (2015), 80–83, 10.1109/MC.2015.122.
-
(2015)
Computer
, vol.48
, Issue.5
, pp. 80-83
-
-
Zhanikeev, M.1
-
31
-
-
85029665329
-
-
arXiv:1507.04492, The Internet of Flying-Things: Opportunities and Challenges with Airborne Fog Computing and Mobile Cloud in the Clouds. Preprint, available online. URL.
-
S.W. Loke, The Internet of Flying-Things: Opportunities and Challenges with Airborne Fog Computing and Mobile Cloud in the Clouds. Preprint, available online arXiv:1507.04492. URL http://arxiv.org/abs/1507.04492.
-
-
-
Loke, S.W.1
-
32
-
-
85029632538
-
-
IBM News Releases, IBM and Nokia Siemens Networks announce world first mobile edge computing platform,, [Online; accessed 15.09.16].
-
IBM News Releases, IBM and Nokia Siemens Networks announce world first mobile edge computing platform, 2013. http://www-03.ibm.com/press/us/en/pressrelease/40490.wss [Online; accessed 15.09.16].
-
(2013)
-
-
-
33
-
-
85029663799
-
-
ETSI, Mobile-Edge Computing Introductory Technical White Paper,, [Online; accessed 15.09.16].
-
ETSI, Mobile-Edge Computing Introductory Technical White Paper, 2014. http://www.etsi.org/technologies-clusters/technologies/mobile-edge-computing [Online; accessed 15.09.16].
-
(2014)
-
-
-
34
-
-
85029652740
-
Radio-aware service-level scheduling to minimize downlink traffic delay through mobile edge computing
-
MONAMI
-
J.O. Fajardo Portillo, I. Taboada Puente, F. Liberal Malaina, Radio-aware service-level scheduling to minimize downlink traffic delay through mobile edge computing, in: Proceedings of the 7th EAI International Conference on Mobile Networks and Management, MONAMI, 2015, pp. 1–14.
-
(2015)
Proceedings of the 7th EAI International Conference on Mobile Networks and Management
, pp. 1-14
-
-
Fajardo Portillo, J.O.1
Taboada Puente, I.2
Liberal Malaina, F.3
-
35
-
-
85029664006
-
-
Mobile Edge Computing: A key technology towards 5G, 2015. [Online; accessed 15.09.16].
-
Y.C. Hu, M. Patel, D. Sabella, N. Sprecher, V. Young, Mobile Edge Computing: A key technology towards 5G, 2015. http://www.etsi.org/technologies-clusters/technologies/mobile-edge-computing [Online; accessed 15.09.16].
-
-
-
Hu, Y.C.1
Patel, M.2
Sabella, D.3
Sprecher, N.4
Young, V.5
-
36
-
-
84890885156
-
Cloud computing models and their application in LTE based cellular systems
-
Proceedings of the 2013 IEEE International Conference on Communications Workshops, ICC, 2013, pp. 750–755.
-
A.J. Staring, G. Karagiannis, Cloud computing models and their application in LTE based cellular systems, in: Proceedings of the 2013 IEEE International Conference on Communications Workshops, ICC, 2013, pp. 750–755. http://dx.doi.org/10.1109/ICCW.2013.6649333.
-
-
-
Staring, A.J.1
Karagiannis, G.2
-
37
-
-
84940434751
-
-
E. Calvanese Strinati, A seamless integration of computationally-enhanced base stations into mobile networks towards 5G, in: Proceedings of the IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–5.
-
M.A. Puente, Z. Becvar, M. Rohlik, F. Lobillo, E. Calvanese Strinati, A seamless integration of computationally-enhanced base stations into mobile networks towards 5G, in: Proceedings of the IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–5. http://dx.doi.org/10.1109/VTCSpring.2015.7145645.
-
-
-
Puente, M.A.1
Becvar, Z.2
Rohlik, M.3
Lobillo, F.4
-
38
-
-
84940971562
-
Invited paper: The audacity of fiber-wireless (FiWi) networks: Revisited for clouds and cloudlets
-
Maier, M., Rimal, B.P., Invited paper: The audacity of fiber-wireless (FiWi) networks: Revisited for clouds and cloudlets. China Commun. 12:8 (2015), 33–45, 10.1109/CC.2015.7224704.
-
(2015)
China Commun.
, vol.12
, Issue.8
, pp. 33-45
-
-
Maier, M.1
Rimal, B.P.2
-
39
-
-
71749119799
-
Green cloud on the horizon
-
M. Jaatun G. Zhao C. Rong Springer Berlin, Heidelberg
-
Ali, M., Green cloud on the horizon. Jaatun, M., Zhao, G., Rong, C., (eds.) Cloud Computing Lecture Notes in Computer Science, vol. 5931, 2009, Springer, Berlin, Heidelberg, 451–459, 10.1007/978-3-642-10665-1_41.
-
(2009)
Cloud Computing, Lecture Notes in Computer Science
, vol.5931
, pp. 451-459
-
-
Ali, M.1
-
40
-
-
84864309803
-
Advancing the state of mobile cloud computing
-
Proceedings of the 3rd ACM Workshop on Mobile Cloud Computing and Services, MCS, 2012, pp. 21–28.
-
P. Bahl, R.Y. Han, L.E. Li, M. Satyanarayanan, Advancing the state of mobile cloud computing, in: Proceedings of the 3rd ACM Workshop on Mobile Cloud Computing and Services, MCS, 2012, pp. 21–28. http://dx.doi.org/10.1145/2307849.2307856.
-
-
-
Bahl, P.1
Han, R.Y.2
Li, L.E.3
Satyanarayanan, M.4
-
41
-
-
84898825587
-
Mobile cloud computing: A survey, state of art and future directions
-
Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V., Venkatasubramanian, N., Mobile cloud computing: A survey, state of art and future directions. Mob. Netw. Appl. 19:2 (2014), 133–143, 10.1007/s11036-013-0477-4.
-
(2014)
Mob. Netw. Appl.
, vol.19
, Issue.2
, pp. 133-143
-
-
Rahimi, M.R.1
Ren, J.2
Liu, C.H.3
Vasilakos, A.V.4
Venkatasubramanian, N.5
-
42
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
Dinh, H.T., Lee, C., Niyato, D., Wang, P., A survey of mobile cloud computing: Architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13:18 (2013), 1587–1611, 10.1002/wcm.1203.
-
(2013)
Wirel. Commun. Mob. Comput.
, vol.13
, Issue.18
, pp. 1587-1611
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
43
-
-
85029662916
-
-
arXiv:1510.07250, Aqua Computing: Coupling Computing and Communications. Preprint, available online. URL.
-
C.S. Magurawalage, K. Yang, K. Wang, Aqua Computing: Coupling Computing and Communications. Preprint, available online arXiv:1510.07250. URL http://arxiv.org/abs/1510.07250.
-
-
-
Magurawalage, C.S.1
Yang, K.2
Wang, K.3
-
44
-
-
84894646273
-
Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges
-
Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R., Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Commun. Surv. Tutor. 16:1 (2014), 337–368, 10.1109/SURV.2013.070813.00285.
-
(2014)
IEEE Commun. Surv. Tutor.
, vol.16
, Issue.1
, pp. 337-368
-
-
Abolfazli, S.1
Sanaei, Z.2
Ahmed, E.3
Gani, A.4
Buyya, R.5
-
45
-
-
70350136710
-
The case for VM-based cloudlets in mobile computing
-
Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N., The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8:4 (2009), 14–23, 10.1109/MPRV.2009.82.
-
(2009)
IEEE Pervasive Comput.
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
46
-
-
85029657057
-
-
Elijah: Cloudlet-based Mobile Computing, 2015. [Online; accessed 15.09.16].
-
M. Satyanarayanan, et al. Elijah: Cloudlet-based Mobile Computing, 2015. http://elijah.cs.cmu.edu/ [Online; accessed 15.09.16].
-
-
-
Satyanarayanan, M.1
-
47
-
-
85007015710
-
Are Cloudlets Necessary?, Technical Report CMU–CS–15–139
-
School of Computer Science, Carnegie Mellon University Pittsburgh, PA October
-
Gao, Y., Hu, W., Ha, K., Amos, B., Pillai, P., Satyanarayanan, M., Are Cloudlets Necessary?, Technical Report CMU–CS–15–139., 2015, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA October.
-
(2015)
-
-
Gao, Y.1
Hu, W.2
Ha, K.3
Amos, B.4
Pillai, P.5
Satyanarayanan, M.6
-
48
-
-
77954990097
-
Hyrax: Cloud computing on mobile devices using mapreduce
-
(Master Thesis CMU–CS–09–164) School of Computer Science, Carnegie Mellon University Pittsburgh, PA September
-
Marinelli, E.E., Hyrax: Cloud computing on mobile devices using mapreduce. (Master Thesis CMU–CS–09–164), 2009, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA September.
-
(2009)
-
-
Marinelli, E.E.1
-
49
-
-
84960153004
-
Femto clouds: Leveraging mobile devices to provide cloud service at the edge
-
Proceedings of the IEEE 8th International Conference on Cloud Computing, CLOUD, 2015, pp. 9–16.
-
K. Habak, M. Ammar, K. Harras, E. Zegura, Femto clouds: Leveraging mobile devices to provide cloud service at the edge, in: Proceedings of the IEEE 8th International Conference on Cloud Computing, CLOUD, 2015, pp. 9–16. http://dx.doi.org/10.1109/CLOUD.2015.12.
-
-
-
Habak, K.1
Ammar, M.2
Harras, K.3
Zegura, E.4
-
50
-
-
84939537469
-
Aura: An IoT based cloud infrastructure for localized mobile computation outsourcing
-
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud, 2015, pp. 183–188.
-
R. Hasan, M. Hossain, R. Khan, Aura: An IoT based cloud infrastructure for localized mobile computation outsourcing, in: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud, 2015, pp. 183–188. http://dx.doi.org/10.1109/MobileCloud.2015.37.
-
-
-
Hasan, R.1
Hossain, M.2
Khan, R.3
-
51
-
-
84977977898
-
Elastic virtual machine placement in cloud computing network environments
-
Kavvadia, E., Sagiadinos, S., Oikonomou, K., Tsioutsiouliklis, G., Assa, S., Elastic virtual machine placement in cloud computing network environments. Comput. Netw. 93:3 (2015), 435–447, 10.1016/j.comnet.2015.09.038.
-
(2015)
Comput. Netw.
, vol.93
, Issue.3
, pp. 435-447
-
-
Kavvadia, E.1
Sagiadinos, S.2
Oikonomou, K.3
Tsioutsiouliklis, G.4
Assa, S.5
-
52
-
-
84940416660
-
The fog balancing: Load distribution for small cell cloud computing
-
Proceedings of the IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–6.
-
J. Oueis, E. Strinati, S. Barbarossa, The fog balancing: Load distribution for small cell cloud computing, in: Proceedings of the IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–6. http://dx.doi.org/10.1109/VTCSpring.2015.7146129.
-
-
-
Oueis, J.1
Strinati, E.2
Barbarossa, S.3
-
53
-
-
84881119458
-
MigCEP: Operator migration for mobility driven distributed complex event processing
-
Proceedings of the 7th ACM International Conference on Distributed Event-based Systems, DEBS, 2013, pp. 183–194.
-
B. Ottenwälder, B. Koldehofe, K. Rothermel, U. Ramachandran, MigCEP: Operator migration for mobility driven distributed complex event processing, in: Proceedings of the 7th ACM International Conference on Distributed Event-based Systems, DEBS, 2013, pp. 183–194. http://dx.doi.org/10.1145/2488222.2488265.
-
-
-
Ottenwälder, B.1
Koldehofe, B.2
Rothermel, K.3
Ramachandran, U.4
-
54
-
-
84881122666
-
Opportunistic spatio-temporal event processing for mobile situation awareness
-
Proceedings of the 7th ACM International Conference on Distributed Event-based Systems, DEBS, 2013, pp. 195–206.
-
K. Hong, D. Lillethun, U. Ramachandran, B. Ottenwälder, B. Koldehofe, Opportunistic spatio-temporal event processing for mobile situation awareness, in: Proceedings of the 7th ACM International Conference on Distributed Event-based Systems, DEBS, 2013, pp. 195–206. http://dx.doi.org/10.1145/2488222.2488266.
-
-
-
Hong, K.1
Lillethun, D.2
Ramachandran, U.3
Ottenwälder, B.4
Koldehofe, B.5
-
55
-
-
84906517574
-
MCEP: A mobility-aware complex event processing system
-
Ottenwälder, B., Koldehofe, B., Rothermel, K., Hong, K., Lillethun, D., Ramachandran, U., MCEP: A mobility-aware complex event processing system. ACM Trans. Internet Technol. 14:1 (2014), 6:1–6:24, 10.1145/2633688.
-
(2014)
ACM Trans. Internet Technol.
, vol.14
, Issue.1
, pp. 61-6:24
-
-
Ottenwälder, B.1
Koldehofe, B.2
Rothermel, K.3
Hong, K.4
Lillethun, D.5
Ramachandran, U.6
-
56
-
-
84949484206
-
High performance computing and network function virtualization: A major challenge towards network programmability
-
Proceedings of the 2015 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom, 2015, pp. 137–141.
-
P. Paglierani, High performance computing and network function virtualization: A major challenge towards network programmability, in: Proceedings of the 2015 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom, 2015, pp. 137–141. http://dx.doi.org/10.1109/BlackSeaCom.2015.7185102.
-
-
-
Paglierani, P.1
-
57
-
-
77958150494
-
Real-time search for real-world entities: A survey
-
Romer, K., Ostermaier, B., Mattern, F., Fahrmair, M., Kellerer, W., Real-time search for real-world entities: A survey. Proc. IEEE 98:11 (2010), 1887–1902, 10.1109/JPROC.2010.2062470.
-
(2010)
Proc. IEEE
, vol.98
, Issue.11
, pp. 1887-1902
-
-
Romer, K.1
Ostermaier, B.2
Mattern, F.3
Fahrmair, M.4
Kellerer, W.5
-
58
-
-
84957592886
-
A fog based system model for cooperative IoT node pairing using matching theory
-
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2015, pp. 309–314.
-
S. Abedin, M. Alam, N. Tran, C.S. Hong, A fog based system model for cooperative IoT node pairing using matching theory, in: Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, APNOMS, 2015, pp. 309–314. http://dx.doi.org/10.1109/APNOMS.2015.7275445.
-
-
-
Abedin, S.1
Alam, M.2
Tran, N.3
Hong, C.S.4
-
59
-
-
84921528293
-
CARDAP: A scalable energy-efficient context aware distributed mobile data analytics platform for the fog
-
Y. Manolopoulos G. Trajcevski M. Kon-Popovska Springer International Publishing
-
Jayaraman, P., Gomes, J., Nguyen, H., Abdallah, Z., Krishnaswamy, S., Zaslavsky, A., CARDAP: A scalable energy-efficient context aware distributed mobile data analytics platform for the fog. Manolopoulos, Y., Trajcevski, G., Kon-Popovska, M., (eds.) Advances in Databases and Information Systems Lecture Notes in Computer Science, vol. 8716, 2014, Springer International Publishing, 192–206, 10.1007/978-3-319-10933-6_15.
-
(2014)
Advances in Databases and Information Systems, Lecture Notes in Computer Science
, vol.8716
, pp. 192-206
-
-
Jayaraman, P.1
Gomes, J.2
Nguyen, H.3
Abdallah, Z.4
Krishnaswamy, S.5
Zaslavsky, A.6
-
60
-
-
84946029667
-
E-HAMC: Leveraging fog computing for emergency alert service
-
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015, pp. 518–523.
-
M. Aazam, E.-N. Huh, E-HAMC: Leveraging fog computing for emergency alert service, in: Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015, pp. 518–523. http://dx.doi.org/10.1109/PERCOMW.2015.7134091.
-
-
-
Aazam, M.1
Huh, E.-N.2
-
61
-
-
84960145851
-
Network store: Exploring slicing in future 5G networks
-
Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, MobiArch, 2015, pp. 8–13.
-
N. Nikaein, E. Schiller, R. Favraud, K. Katsalis, D. Stavropoulos, I. Alyafawi, Z. Zhao, T. Braun, T. Korakis, Network store: Exploring slicing in future 5G networks, in: Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, MobiArch, 2015, pp. 8–13. http://dx.doi.org/10.1145/2795381.2795390.
-
-
-
Nikaein, N.1
Schiller, E.2
Favraud, R.3
Katsalis, K.4
Stavropoulos, D.5
Alyafawi, I.6
Zhao, Z.7
Braun, T.8
Korakis, T.9
-
62
-
-
84964445274
-
Securing the Internet of things: Mapping IoT attack surface areas with the OWASP IoT top 10 project
-
D. Miessler, Securing the Internet of things: Mapping IoT attack surface areas with the OWASP IoT top 10 project, in: Proceedings of the 2015 RSA Conference, 2015.
-
(2015)
Proceedings of the 2015 RSA Conference
-
-
Miessler, D.1
-
63
-
-
84879225866
-
On the features and challenges of security and privacy in distributed Internet of things
-
Roman, R., Zhou, J., Lopez, J., On the features and challenges of security and privacy in distributed Internet of things. Comput. Netw. 57:10 (2013), 2266–2279, 10.1016/j.comnet.2012.12.018.
-
(2013)
Comput. Netw.
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
64
-
-
84856897107
-
Cloud computing: Challenges and future directions
-
Choo, K.-K.R., Cloud computing: Challenges and future directions. Trends Issues Crime Criminal Justice 400 (2010), 1–6.
-
(2010)
Trends Issues Crime Criminal Justice
, vol.400
, pp. 1-6
-
-
Choo, K.-K.R.1
-
65
-
-
84896456624
-
Highlights from making sense of Snowden, Part II: What's significant in the NSA revelations
-
Landau, S., Highlights from making sense of Snowden, Part II: What's significant in the NSA revelations. IEEE Secur. Privacy 12:1 (2014), 62–64, 10.1109/MSP.2013.161.
-
(2014)
IEEE Secur. Privacy
, vol.12
, Issue.1
, pp. 62-64
-
-
Landau, S.1
-
66
-
-
84928750893
-
Cloud attack and risk assessment taxonomy
-
Juliadotter, N.V., Choo, K.-K.R., Cloud attack and risk assessment taxonomy. IEEE Cloud Comput. 2:1 (2015), 14–20, 10.1109/MCC.2015.2.
-
(2015)
IEEE Cloud Comput.
, vol.2
, Issue.1
, pp. 14-20
-
-
Juliadotter, N.V.1
Choo, K.-K.R.2
-
67
-
-
84919340836
-
Multi-tiered security architecture for ARM via the virtualization and security extensions
-
Proceedings of the 25th International Workshop on the Database and Expert Systems Applications DEXA, 2014, pp. 308–312.
-
T. Lengyel, T. Kittel, J. Pfoh, C. Eckert, Multi-tiered security architecture for ARM via the virtualization and security extensions, in: Proceedings of the 25th International Workshop on the Database and Expert Systems Applications DEXA, 2014, pp. 308–312. http://dx.doi.org/10.1109/DEXA.2014.68.
-
-
-
Lengyel, T.1
Kittel, T.2
Pfoh, J.3
Eckert, C.4
-
68
-
-
84880098818
-
A survey of security issues in hardware virtualization
-
Pék, G., Buttyán, L., Bencsáth, B., A survey of security issues in hardware virtualization. ACM Comput. Surv. 45:3 (2013), 40:1–40:34, 10.1145/2480741.2480757.
-
(2013)
ACM Comput. Surv.
, vol.45
, Issue.3
, pp. 401-40:34
-
-
Pék, G.1
Buttyán, L.2
Bencsáth, B.3
-
69
-
-
84990058918
-
Security challenges of small cell as a service in virtualized mobile edge computing environments
-
Springer International Publishing
-
Vassilakis, V., Panaousis, E., Mouratidis, H., Security challenges of small cell as a service in virtualized mobile edge computing environments. 10th IFIP International Conference on Information Security Theory and Practice, WISTP 2016, 2016, Springer International Publishing, 70–84, 10.1007/978-3-319-45931-8_5.
-
(2016)
10th IFIP International Conference on Information Security Theory and Practice, WISTP 2016
, pp. 70-84
-
-
Vassilakis, V.1
Panaousis, E.2
Mouratidis, H.3
-
70
-
-
77149139158
-
Limits of predictability in human mobility
-
Song, C., Qu, Z., Blumm, N., Barabási, A.-L., Limits of predictability in human mobility. Science 327:5968 (2010), 1018–1021, 10.1126/science.1177170.
-
(2010)
Science
, vol.327
, Issue.5968
, pp. 1018-1021
-
-
Song, C.1
Qu, Z.2
Blumm, N.3
Barabási, A.-L.4
-
71
-
-
84942465510
-
A cloud-focused mobile forensics methodology
-
Do, Q., Martini, B., Choo, K.-K.R., A cloud-focused mobile forensics methodology. IEEE Cloud Comput. 2:4 (2015), 60–65, 10.1109/MCC.2015.71.
-
(2015)
IEEE Cloud Comput.
, vol.2
, Issue.4
, pp. 60-65
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
72
-
-
85013744824
-
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments
-
Elsevier
-
Barrett, D., Kipper, G., Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments. 2010, Elsevier.
-
(2010)
-
-
Barrett, D.1
Kipper, G.2
-
73
-
-
84971492452
-
Cloud incident handling and forensic-by-design: Cloud storage as a case study
-
in press
-
Ab Rahman, N.H., Cahyani, N.D.W., Choo, K.-K.R., Cloud incident handling and forensic-by-design: Cloud storage as a case study. Concurr. Comput. Pract. Exper., 2016, 10.1002/cpe.3868 in press.
-
(2016)
Concurr. Comput. Pract. Exper.
-
-
Ab Rahman, N.H.1
Cahyani, N.D.W.2
Choo, K.-K.R.3
-
74
-
-
84939497302
-
Towards a systematic analysis of challenges and issues in secure mobile cloud forensics
-
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 237–238.
-
S. Zawoad, R. Hasan, Towards a systematic analysis of challenges and issues in secure mobile cloud forensics, in: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 237–238. http://dx.doi.org/10.1109/MobileCloud.2015.32.
-
-
-
Zawoad, S.1
Hasan, R.2
-
75
-
-
84905817532
-
Interconnected cloud computing environments: Challenges, taxonomy, and survey
-
Toosi, A.N., Calheiros, R.N., Buyya, R., Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Comput. Surv. 47:1 (2014), 7:1–7:47, 10.1145/2593512.
-
(2014)
ACM Comput. Surv.
, vol.47
, Issue.1
, pp. 71-7:47
-
-
Toosi, A.N.1
Calheiros, R.N.2
Buyya, R.3
-
76
-
-
84937622256
-
Attribute-based authorization for structured Peer-to-Peer (P2P) networks
-
Touceda, D.S., Cmara, J.M.S., Zeadally, S., Soriano, M., Attribute-based authorization for structured Peer-to-Peer (P2P) networks. Comput. Stand. Interfaces 42 (2015), 71–83, 10.1016/j.csi.2015.04.007.
-
(2015)
Comput. Stand. Interfaces
, vol.42
, pp. 71-83
-
-
Touceda, D.S.1
Cmara, J.M.S.2
Zeadally, S.3
Soriano, M.4
-
77
-
-
84953776557
-
A secure authentication scheme for mobicloud
-
International Conference on Computer Communication and Informatics, ICCCI, 2015, pp. 1–6.
-
A. Donald, L. Arockiam, A secure authentication scheme for mobicloud, in: International Conference on Computer Communication and Informatics, ICCCI, 2015, pp. 1–6. http://dx.doi.org/10.1109/ICCCI.2015.7218101.
-
-
-
Donald, A.1
Arockiam, L.2
-
78
-
-
84991768903
-
Octopus: An edge-fog mutual authentication scheme
-
Ibrahim, M.H., Octopus: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18:6 (2016), 1089–1101.
-
(2016)
Int. J. Netw. Secur.
, vol.18
, Issue.6
, pp. 1089-1101
-
-
Ibrahim, M.H.1
-
79
-
-
85027942960
-
A privacy-aware authentication scheme for distributed mobile cloud computing services
-
Tsai, J.-L., Lo, N.-W., A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9:3 (2015), 805–815, 10.1109/JSYST.2014.2322973.
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.3
, pp. 805-815
-
-
Tsai, J.-L.1
Lo, N.-W.2
-
80
-
-
85029650583
-
Security architecture for federated mobile cloud computing
-
Springer (in press)
-
Xu, S., Ratazzi, E.P., Du, W., Security architecture for federated mobile cloud computing. Mobile Cloud Security, 2016, Springer (in press).
-
(2016)
Mobile Cloud Security
-
-
Xu, S.1
Ratazzi, E.P.2
Du, W.3
-
81
-
-
84903835491
-
-
A. Benkara Mostefa, F. Houacine, H. Cagnon, Cloudlets authentication in nfc-based mobile computing, in: Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014, pp. 267–272.
-
S. Bouzefrane, A. Benkara Mostefa, F. Houacine, H. Cagnon, Cloudlets authentication in nfc-based mobile computing, in: Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014, pp. 267–272. http://dx.doi.org/10.1109/MobileCloud.2014.46.
-
-
-
Bouzefrane, S.1
-
82
-
-
84886728890
-
Secure localization and location verification in wireless sensor networks: A survey
-
Zeng, Y., Cao, J., Hong, J., Zhang, S., Xie, L., Secure localization and location verification in wireless sensor networks: A survey. J. Supercomput. 64:3 (2010), 685–701, 10.1007/s11227-010-0501-4.
-
(2010)
J. Supercomput.
, vol.64
, Issue.3
, pp. 685-701
-
-
Zeng, Y.1
Cao, J.2
Hong, J.3
Zhang, S.4
Xie, L.5
-
83
-
-
85024392132
-
Context-aware authentication for the Internet of things
-
K. Habib, W. Leister, Context-aware authentication for the Internet of things, in: Proceedings of the 11th International Conference on Autonomic and Autonomous Systems, ICAS, 2015, pp. 134–139.
-
(2015)
Proceedings of the 11th International Conference on Autonomic and Autonomous Systems, ICAS
, pp. 134-139
-
-
Habib, K.1
Leister, W.2
-
84
-
-
84953271237
-
Efficient handover authentication with user anonymity and untraceability for mobile cloud computing
-
URL
-
Yang, X., Huang, X., Liu, J.K., Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Future Gener. Comput. Syst., 2015, 10.1016/j.future.2015.09.028 URL http://www.sciencedirect.com/science/article/pii/S0167739X15003088.
-
(2015)
Future Gener. Comput. Syst.
-
-
Yang, X.1
Huang, X.2
Liu, J.K.3
-
85
-
-
84959555644
-
Personal cloudlets: Implementing a user-centric datastore with privacy aware access control for cloud-based data platforms
-
Proceedings of the IEEE/ACM 1st International Workshop on Technical and Legal aspects of data privacy and Security, TELERISE, 2015, pp. 38–43.
-
D. McCarthy, P. Malone, J. Hange, K. Doyle, E. Robson, D. Conway, S. Ivanov, L. Radziwonowicz, R. Kleinfeld, T. Michalareas, T. Kastrinogiannis, N. Stasinos, F. Lampathaki, Personal cloudlets: Implementing a user-centric datastore with privacy aware access control for cloud-based data platforms, in: Proceedings of the IEEE/ACM 1st International Workshop on Technical and Legal aspects of data privacy and Security, TELERISE, 2015, pp. 38–43. http://dx.doi.org/10.1109/TELERISE.2015.15.
-
-
-
McCarthy, D.1
Malone, P.2
Hange, J.3
Doyle, K.4
Robson, E.5
Conway, D.6
Ivanov, S.7
Radziwonowicz, L.8
Kleinfeld, R.9
Michalareas, T.10
Kastrinogiannis, T.11
Stasinos, N.12
Lampathaki, F.13
-
86
-
-
84910634929
-
Robust multi-factor authentication for fragile communications
-
Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11:6 (2014), 568–581, 10.1109/TDSC.2013.2297110.
-
(2014)
IEEE Trans. Dependable Secure Comput.
, vol.11
, Issue.6
, pp. 568-581
-
-
Huang, X.1
Xiang, Y.2
Bertino, E.3
Zhou, J.4
Xu, L.5
-
87
-
-
84988472425
-
Security analysis of mobile edge computing in virtualized small cell networks
-
Springer International Publishing
-
Vassilakis, V., Chochliouros, I.P., Spiliopoulou, A.S., Sfakianakis, E., Belesioti, M., Bompetsis, N., Wilson, M., Turyagyenda, C., Dardamanis, A., Security analysis of mobile edge computing in virtualized small cell networks. 12th IFIP International Conference on Artificial Intelligence Applications and Innovations, AIAI 2016, 2016, Springer International Publishing, 653–665, 10.1007/978-3-319-44944-9_58.
-
(2016)
12th IFIP International Conference on Artificial Intelligence Applications and Innovations, AIAI 2016
, pp. 653-665
-
-
Vassilakis, V.1
Chochliouros, I.P.2
Spiliopoulou, A.S.3
Sfakianakis, E.4
Belesioti, M.5
Bompetsis, N.6
Wilson, M.7
Turyagyenda, C.8
Dardamanis, A.9
-
88
-
-
84941286216
-
Policy-driven security management for fog computing: Preliminary framework and a case study
-
Proceedings of the IEEE 15th International Conference on Information Reuse and Integration, IRI, 2014, pp. 16–23.
-
C. Dsouza, G.-J. Ahn, M. Taguinod, Policy-driven security management for fog computing: Preliminary framework and a case study, in: Proceedings of the IEEE 15th International Conference on Information Reuse and Integration, IRI, 2014, pp. 16–23. http://dx.doi.org/10.1109/IRI.2014.7051866.
-
-
-
Dsouza, C.1
Ahn, G.-J.2
Taguinod, M.3
-
89
-
-
84959084095
-
A Survey of extended role-based access control in cloud computing
-
W. E. Wong (Ed.), Proceedings of the 4th International Conference on Computer Engineering and Networks, 2015, pp. 821–831.
-
H. Li, S. Wang, X. Tian, W. Wei, C. Sun, A Survey of extended role-based access control in cloud computing, in: W. E. Wong (Ed.), Proceedings of the 4th International Conference on Computer Engineering and Networks, 2015, pp. 821–831. http://dx.doi.org/10.1007/978-3-319-11104-9_95.
-
-
-
Li, H.1
Wang, S.2
Tian, X.3
Wei, W.4
Sun, C.5
-
90
-
-
84951949351
-
Access control models for pervasive environments: A survey
-
T. Gaber A.E. Hassanien N. El-Bendary N. Dey AISI Springer International Publishing
-
Elsayed, W., Gaber, T., Zhang, N., Ibrahim Moussa, M., Access control models for pervasive environments: A survey. Gaber, T., Hassanien, A.E., El-Bendary, N., Dey, N., (eds.) Proceedings of the 1st International Conference on Advanced Intelligent System and Informatics, AISI Advances in Intelligent Systems and Computing, vol. 407, 2015, Springer International Publishing, 511–522, 10.1007/978-3-319-26690-9_45.
-
(2015)
Proceedings of the 1st International Conference on Advanced Intelligent System and Informatics, Advances in Intelligent Systems and Computing
, vol.407
, pp. 511-522
-
-
Elsayed, W.1
Gaber, T.2
Zhang, N.3
Ibrahim Moussa, M.4
-
91
-
-
84857523561
-
A distributed access control architecture for cloud computing
-
Almutairi, A.A., Sarfraz, M.I., Basalamah, S., Aref, W.G., Ghafoor, A., A distributed access control architecture for cloud computing. IEEE Softw. 29:2 (2012), 36–44, 10.1109/MS.2011.153.
-
(2012)
IEEE Softw.
, vol.29
, Issue.2
, pp. 36-44
-
-
Almutairi, A.A.1
Sarfraz, M.I.2
Basalamah, S.3
Aref, W.G.4
Ghafoor, A.5
-
92
-
-
84944539539
-
DAA-A: Direct anonymous attestation with attributes
-
M. Conti M. Schunter I. Askoxylakis Springer International Publishing
-
Chen, L., Urian, R., DAA-A: Direct anonymous attestation with attributes. Conti, M., Schunter, M., Askoxylakis, I., (eds.) Trust and Trustworthy Computing Lecture Notes in Computer Science, vol. 9229, 2015, Springer International Publishing, 228–245, 10.1007/978-3-319-22846-4_14.
-
(2015)
Trust and Trustworthy Computing, Lecture Notes in Computer Science
, vol.9229
, pp. 228-245
-
-
Chen, L.1
Urian, R.2
-
93
-
-
78649813511
-
Attribute-based authenticated key exchange
-
Springer Berlin Heidelberg
-
Gorantla, M.C., Boyd, C., González Nieto, J.M., Attribute-based authenticated key exchange. Proceedings of the 15th Australasian Conference on Information Security and Privacy, ACISP, 2010, Springer, Berlin Heidelberg, 300–317, 10.1007/978-3-642-14081-5_19.
-
(2010)
Proceedings of the 15th Australasian Conference on Information Security and Privacy, ACISP
, pp. 300-317
-
-
Gorantla, M.C.1
Boyd, C.2
González Nieto, J.M.3
-
94
-
-
84941878757
-
OCP: A protocol for secure communication in federated content networks
-
security and Privacy in Unified Communications: Challenges and Solutions
-
Pimentel, H.M., Kopp, S., ~, M.A.S. Jr., Silveira, R.M., Bressan, G., OCP: A protocol for secure communication in federated content networks. Comput. Commun. 68 (2015), 47–60, 10.1016/j.comcom.2015.07.026 security and Privacy in Unified Communications: Challenges and Solutions.
-
(2015)
Comput. Commun.
, vol.68
, pp. 47-60
-
-
Pimentel, H.M.1
Kopp, S.2
Silveira, R.M.3
Bressan, G.4
-
95
-
-
84969940808
-
Security in software defined networks: A survey
-
Ahmad, I., Namal, S., Ylianttila, M., Gurtov, A., Security in software defined networks: A survey. IEEE Commun. Surv. Tutor. 17:4 (2015), 2317–2346, 10.1109/COMST.2015.2474118.
-
(2015)
IEEE Commun. Surv. Tutor.
, vol.17
, Issue.4
, pp. 2317-2346
-
-
Ahmad, I.1
Namal, S.2
Ylianttila, M.3
Gurtov, A.4
-
96
-
-
84919935425
-
Software-defined networking: A comprehensive survey
-
Kreutz, D., Ramos, F., Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S., Uhlig, S., Software-defined networking: A comprehensive survey. Proc. IEEE 103:1 (2015), 14–76, 10.1109/JPROC.2014.2371999.
-
(2015)
Proc. IEEE
, vol.103
, Issue.1
, pp. 14-76
-
-
Kreutz, D.1
Ramos, F.2
Esteves Verissimo, P.3
Esteve Rothenberg, C.4
Azodolmolky, S.5
Uhlig, S.6
-
97
-
-
84960954325
-
Software-defined network function virtualization: A survey
-
Li, Y., Chen, M., Software-defined network function virtualization: A survey. IEEE Access 3 (2015), 2542–2553, 10.1109/ACCESS.2015.2499271.
-
(2015)
IEEE Access
, vol.3
, pp. 2542-2553
-
-
Li, Y.1
Chen, M.2
-
98
-
-
84953392935
-
Software-defined mobile networks security
-
Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X., Software-defined mobile networks security. Mob. Netw. Appl., 2016, 1–15, 10.1007/s11036-015-0665-5.
-
(2016)
Mob. Netw. Appl.
, pp. 1-15
-
-
Chen, M.1
Qian, Y.2
Mao, S.3
Tang, W.4
Yang, X.5
-
99
-
-
84892438051
-
Trust modelling and analysis in peer-to-peer clouds
-
Petri, I., Rana, O.F., Rezgui, Y., Silaghi, G.C., Trust modelling and analysis in peer-to-peer clouds. Int. J. Cloud Comput. 1:2–3 (2012), 221–239, 10.1504/IJCC.2012.046714.
-
(2012)
Int. J. Cloud Comput.
, vol.1
, Issue.2-3
, pp. 221-239
-
-
Petri, I.1
Rana, O.F.2
Rezgui, Y.3
Silaghi, G.C.4
-
100
-
-
84894174308
-
A trust model using implicit call behavioral graph for mobile cloud computing
-
G. Wang I. Ray D. Feng M. Rajarajan Springer International Publishing
-
Chen, S., Wang, G., Jia, W., A trust model using implicit call behavioral graph for mobile cloud computing. Wang, G., Ray, I., Feng, D., Rajarajan, M., (eds.) Cyberspace Safety and Security Lecture Notes in Computer Science, vol. 8300, 2013, Springer International Publishing, 387–402, 10.1007/978-3-319-03584-0_29.
-
(2013)
Cyberspace Safety and Security, Lecture Notes in Computer Science
, vol.8300
, pp. 387-402
-
-
Chen, S.1
Wang, G.2
Jia, W.3
-
101
-
-
84949575608
-
Trust in mobile cloud computing with lte-based deployment
-
Proceedings of the IEEE 11th Intl. Conf. Ubiquitous Intelligence and Computing, and IEEE 11th Intl. Conf. on Autonomic and Trusted Computing, and IEEE 14th Intl. Conf. on Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom), 2014, pp. 643–648.
-
M. Hussain, B. Almourad, Trust in mobile cloud computing with lte-based deployment, in: Proceedings of the IEEE 11th Intl. Conf. Ubiquitous Intelligence and Computing, and IEEE 11th Intl. Conf. on Autonomic and Trusted Computing, and IEEE 14th Intl. Conf. on Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom), 2014, pp. 643–648. http://dx.doi.org/10.1109/UIC-ATC-ScalCom.2014.52.
-
-
-
Hussain, M.1
Almourad, B.2
-
102
-
-
84870042316
-
A survey of reputation and trust mechanism in peer-to-peer network
-
Proceedings of the 2012 International Conference on Industrial Control and Electronics Engineering, ICICEE, 2012, pp. 116–119.
-
G. Shang-Fu, Z. Jian-Lei, A survey of reputation and trust mechanism in peer-to-peer network, in: Proceedings of the 2012 International Conference on Industrial Control and Electronics Engineering, ICICEE, 2012, pp. 116–119. http://dx.doi.org/10.1109/ICICEE.2012.39.
-
-
-
Shang-Fu, G.1
Jian-Lei, Z.2
-
103
-
-
84901427258
-
A survey on trust management for Internet of things
-
Yan, Z., Zhang, P., Vasilakos, A.V., A survey on trust management for Internet of things. J. Netw. Comput. Appl. 42 (2014), 120–134, 10.1016/j.jnca.2014.01.014.
-
(2014)
J. Netw. Comput. Appl.
, vol.42
, pp. 120-134
-
-
Yan, Z.1
Zhang, P.2
Vasilakos, A.V.3
-
104
-
-
84969855921
-
A survey of trust management models for cloud computing
-
F. Corradini, F.D. Angelis, F. Ippoliti, F. Marcantoni, A survey of trust management models for cloud computing, in: Proceedings of the 5th International Conference on Cloud Computing and Services Science (CLOSER), 2015, pp. 155–161.
-
(2015)
Proceedings of the 5th International Conference on Cloud Computing and Services Science (CLOSER)
, pp. 155-161
-
-
Corradini, F.1
Angelis, F.D.2
Ippoliti, F.3
Marcantoni, F.4
-
105
-
-
84964292282
-
Representation of trust and reputation in self-managed computing systems
-
Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM’15), 2015, pp. 1827–1834.
-
J. Kantert, S. Edenhofer, S. Tomforde, C. Muller-Schloer, Representation of trust and reputation in self-managed computing systems, in: Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM’15), 2015, pp. 1827–1834. http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.273.
-
-
-
Kantert, J.1
Edenhofer, S.2
Tomforde, S.3
Muller-Schloer, C.4
-
106
-
-
84955465738
-
A sound approach to security in mobile and cloud-oriented environments
-
Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST), 2015, pp. 1–7.
-
M. Figueroa, K. Uttecht, J. Rosenberg, A sound approach to security in mobile and cloud-oriented environments, in: Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST), 2015, pp. 1–7. http://dx.doi.org/10.1109/THS.2015.7225266.
-
-
-
Figueroa, M.1
Uttecht, K.2
Rosenberg, J.3
-
107
-
-
84908407053
-
A trust management solution in the context of hybrid clouds
-
Proceedings of the IEEE 23rd International WETICE Conference (WETICE), 2014, pp. 339–344.
-
N. Bennani, K. Boukadi, C. Ghedira-Guegan, A trust management solution in the context of hybrid clouds, in: Proceedings of the IEEE 23rd International WETICE Conference (WETICE), 2014, pp. 339–344. http://dx.doi.org/10.1109/WETICE.2014.76.
-
-
-
Bennani, N.1
Boukadi, K.2
Ghedira-Guegan, C.3
-
108
-
-
84964336316
-
Friend or foe? detecting and isolating malicious nodes in mobile edge computing platforms
-
IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom’15), 2015, pp. 42–49.
-
A. Mtibaa, K. Harras, H. Alnuweiri, Friend or foe? detecting and isolating malicious nodes in mobile edge computing platforms, in: IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom’15), 2015, pp. 42–49. http://dx.doi.org/10.1109/CloudCom.2015.40.
-
-
-
Mtibaa, A.1
Harras, K.2
Alnuweiri, H.3
-
109
-
-
84923009701
-
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
-
Gai, K., Qiu, M., Tao, L., Zhu, Y., Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Secur. Commun. Netw. 9:16 (2016), 3049–3058.
-
(2016)
Secur. Commun. Netw.
, vol.9
, Issue.16
, pp. 3049-3058
-
-
Gai, K.1
Qiu, M.2
Tao, L.3
Zhu, Y.4
-
110
-
-
84939506714
-
Cloudlet mesh for securing mobile clouds from intrusions and network attacks
-
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 109–118.
-
Y. Shi, S. Abhilash, K. Hwang, Cloudlet mesh for securing mobile clouds from intrusions and network attacks, in: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 109–118. http://dx.doi.org/10.1109/MobileCloud.2015.15.
-
-
-
Shi, Y.1
Abhilash, S.2
Hwang, K.3
-
111
-
-
84983503423
-
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
-
Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K.-K.R., On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74 (2016), 98–120, 10.1016/j.jnca.2016.08.016.
-
(2016)
J. Netw. Comput. Appl.
, vol.74
, pp. 98-120
-
-
Iqbal, S.1
Kiah, M.L.M.2
Dhaghighi, B.3
Hussain, M.4
Khan, S.5
Khan, M.K.6
Choo, K.-K.R.7
-
112
-
-
84943616583
-
Till all are one: Towards a unified cloud IDS
-
S. Fischer-Hbner C. Lambrinoudakis J. Lpez Springer International Publishing
-
Pitropakis, N., Lambrinoudakis, C., Geneiatakis, D., Till all are one: Towards a unified cloud IDS. Fischer-Hbner, S., Lambrinoudakis, C., Lpez, J., (eds.) Trust, Privacy and Security in Digital Business Lecture Notes in Computer Science, vol. 9264, 2015, Springer International Publishing, 136–149, 10.1007/978-3-319-22906-5_11.
-
(2015)
Trust, Privacy and Security in Digital Business, Lecture Notes in Computer Science
, vol.9264
, pp. 136-149
-
-
Pitropakis, N.1
Lambrinoudakis, C.2
Geneiatakis, D.3
-
113
-
-
84938392011
-
Federated cloud security architecture for secure and agile clouds
-
K.J. Han B.-Y. Choi S. Song Springer New York
-
Luo, W., Xu, L., Zhan, Z., Zheng, Q., Xu, S., Federated cloud security architecture for secure and agile clouds. Han, K.J., Choi, B.-Y., Song, S., (eds.) High Performance Cloud Auditing and Applications, 2014, Springer, New York, 169–188, 10.1007/978-1-4614-3296-8_7.
-
(2014)
High Performance Cloud Auditing and Applications
, pp. 169-188
-
-
Luo, W.1
Xu, L.2
Zhan, Z.3
Zheng, Q.4
Xu, S.5
-
114
-
-
84955587196
-
Threat analysis and misuse patterns of federated inter-cloud systems
-
Proceedings of the 19th European Conference on Pattern Languages of Programs (EuroPLoP), 2014, pp. 13:1–13:8.
-
C.O. Encina, E.B. Fernandez, A.R. Monge, Threat analysis and misuse patterns of federated inter-cloud systems, in: Proceedings of the 19th European Conference on Pattern Languages of Programs (EuroPLoP), 2014, pp. 13:1–13:8. http://dx.doi.org/10.1145/2721956.2721986.
-
-
-
Encina, C.O.1
Fernandez, E.B.2
Monge, A.R.3
-
115
-
-
84944184710
-
PiMiCo: Privacy preservation via migration in collaborative mobile clouds
-
Proceedings of the 48th Hawaii International Conference on System Sciences (HICSS), 2015, pp. 5341–5351.
-
K. Ravichandran, A. Gavrilovska, S. Pande, PiMiCo: Privacy preservation via migration in collaborative mobile clouds, in: Proceedings of the 48th Hawaii International Conference on System Sciences (HICSS), 2015, pp. 5341–5351. http://dx.doi.org/10.1109/HICSS.2015.628.
-
-
-
Ravichandran, K.1
Gavrilovska, A.2
Pande, S.3
-
116
-
-
84924663051
-
Mobile cloud computing based privacy protection in location-based information survey applications
-
Zhang, H., Yu, N., Wen, Y., Mobile cloud computing based privacy protection in location-based information survey applications. Secur. Commun. Netw. 8:6 (2015), 1006–1025, 10.1002/sec.1055.
-
(2015)
Secur. Commun. Netw.
, vol.8
, Issue.6
, pp. 1006-1025
-
-
Zhang, H.1
Yu, N.2
Wen, Y.3
-
117
-
-
85000613745
-
Software defined networking with pseudonym systems for secure vehicular clouds
-
Huang, X., Yu, R., Kang, J., Wang, N., Maharjan, S., Zhang, Y., Software defined networking with pseudonym systems for secure vehicular clouds. IEEE Access 4 (2016), 3522–3534, 10.1109/ACCESS.2016.2560902.
-
(2016)
IEEE Access
, vol.4
, pp. 3522-3534
-
-
Huang, X.1
Yu, R.2
Kang, J.3
Wang, N.4
Maharjan, S.5
Zhang, Y.6
-
118
-
-
84922777386
-
Trust modelling and analysis in peer-to-peer clouds
-
Cruz Zapata, B., Fernandez-Aleman, J.L., Toval, A., Trust modelling and analysis in peer-to-peer clouds. Comput. Sci. Inf. Syst. 12:1 (2015), 161–184, 10.2298/CSIS140205086C.
-
(2015)
Comput. Sci. Inf. Syst.
, vol.12
, Issue.1
, pp. 161-184
-
-
Cruz Zapata, B.1
Fernandez-Aleman, J.L.2
Toval, A.3
-
119
-
-
85027086227
-
Security for Cloud Computing
-
Artec House Boston
-
Di Pietro, R., Lombardi, F., Security for Cloud Computing. 2015, Artec House, Boston 978-1-60807-989-6.
-
(2015)
-
-
Di Pietro, R.1
Lombardi, F.2
-
120
-
-
84935007320
-
Data security and privacy in cloud computing
-
(Article ID 190903)
-
Sun, Y., Zhang, J., Xiong, Y., Zhu, G., Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 2014 (2014), 1–9, 10.1155/2014/190903 (Article ID 190903).
-
(2014)
Int. J. Distrib. Sens. Netw.
, vol.2014
, pp. 1-9
-
-
Sun, Y.1
Zhang, J.2
Xiong, Y.3
Zhu, G.4
-
121
-
-
84883025016
-
Personal cloudlets for privacy and resource efficiency in mobile in-app advertising
-
Proceedings of the 1st International Workshop on Mobile Cloud Computing and Networking (MobileCloud), 2013, pp. 33–40.
-
S. Seneviratne, A. Seneviratne, P. Mohapatra, Personal cloudlets for privacy and resource efficiency in mobile in-app advertising, in: Proceedings of the 1st International Workshop on Mobile Cloud Computing and Networking (MobileCloud), 2013, pp. 33–40. http://dx.doi.org/10.1145/2492348.2492356.
-
-
-
Seneviratne, S.1
Seneviratne, A.2
Mohapatra, P.3
-
122
-
-
84937054511
-
Cloud-based secure health monitoring: Optimizing fully-homomorphic encryption for streaming algorithms
-
Proceedings of the 2014 Globecom Workshops, 2014, pp. 48–52.
-
A. Page, O. Kocabas, S. Ames, M. Venkitasubramaniam, T. Soyata, Cloud-based secure health monitoring: Optimizing fully-homomorphic encryption for streaming algorithms, in: Proceedings of the 2014 Globecom Workshops, 2014, pp. 48–52. http://dx.doi.org/10.1109/GLOCOMW.2014.7063384.
-
-
-
Page, A.1
Kocabas, O.2
Ames, S.3
Venkitasubramaniam, M.4
Soyata, T.5
-
123
-
-
84936802513
-
Privacy using mobile cloud computing
-
Proceedings of the 5th International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 2015, 178–182.
-
J. Abdo, J. Demerjian, H. Chaouchi, T. Atechian, C. Bassil, Privacy using mobile cloud computing, in: Proceedings of the 5th International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 2015, 178–182. http://dx.doi.org/10.1109/DICTAP.2015.7113194.
-
-
-
Abdo, J.1
Demerjian, J.2
Chaouchi, H.3
Atechian, T.4
Bassil, C.5
-
124
-
-
84997089333
-
Virtualization and cloud security: benefits, caveats, and future developments
-
Springer International Publishing
-
Lombardi, F., Di Pietro, R., Virtualization and cloud security: benefits, caveats, and future developments. Cloud Computing: Challenges, Limitations and R&D Solutions, 2014, Springer International Publishing, 237–255, 10.1007/978-3-319-10530-7_10.
-
(2014)
Cloud Computing: Challenges, Limitations and R&D Solutions
, pp. 237-255
-
-
Lombardi, F.1
Di Pietro, R.2
-
125
-
-
84910156435
-
-
L. van Doorn, vTPM: Virtualizing the trusted platform module, in: Proceedings of the 15th Conference on USENIX Security Symposium (USENIX-SS’06)
-
S. Berger, R. Cáceres, K.A. Goldman, R. Perez, R. Sailer, L. van Doorn, vTPM: Virtualizing the trusted platform module, in: Proceedings of the 15th Conference on USENIX Security Symposium (USENIX-SS’06), 2006.
-
(2006)
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
-
126
-
-
84881021623
-
TVMCM: A trusted VM clone model in cloud computing
-
W. Ma, X. Li, Y. Shi, Y. Guo, TVMCM: A trusted VM clone model in cloud computing, in: 6th International Conference on New Trends in Information Science and Service Science and Data Mining (ISSDM’12), 2012, pp. 607–611.
-
(2012)
6th International Conference on New Trends in Information Science and Service Science and Data Mining (ISSDM’12)
, pp. 607-611
-
-
Ma, W.1
Li, X.2
Shi, Y.3
Guo, Y.4
-
127
-
-
84904489078
-
Secure live virtual machines migration: Issues and solutions
-
28th International Conference on Advanced Information Networking and Applications Workshops (WAINA’14), 2014, PP. 160–165.
-
M. Aiash, G. Mapp, O. Gemikonakli, Secure live virtual machines migration: Issues and solutions, in: 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA’14), 2014, PP. 160–165. http://dx.doi.org/10.1109/WAINA.2014.35.
-
-
-
Aiash, M.1
Mapp, G.2
Gemikonakli, O.3
-
128
-
-
84951273500
-
The trust problem in modern network infrastructures
-
Springer International Publishing
-
Jacquin, L., Lioy, A., Lopez, D.R., Shaw, A.L., Su, T., The trust problem in modern network infrastructures. Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, 2015, Springer International Publishing, 116–127, 10.1007/978-3-319-25360-2_10.
-
(2015)
Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum
, pp. 116-127
-
-
Jacquin, L.1
Lioy, A.2
Lopez, D.R.3
Shaw, A.L.4
Su, T.5
-
129
-
-
84954289899
-
SMOC: A secure mobile cloud computing platform
-
Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), 2015, pp. 2668–2676.
-
Z. Hao, Y. Tang, Y. Zhang, E. Novak, N. Carter, Q. Li, SMOC: A secure mobile cloud computing platform, in: Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), 2015, pp. 2668–2676. http://dx.doi.org/10.1109/INFOCOM.2015.7218658.
-
-
-
Hao, Z.1
Tang, Y.2
Zhang, Y.3
Novak, E.4
Carter, N.5
Li, Q.6
-
130
-
-
84983428951
-
Adaptive and secure application partitioning for offloading in mobile cloud computing
-
J.H. Abawajy S. Mukherjea S.M. Thampi A. Ruiz-Martnez Springer International Publishing
-
Dhanya, N.M., Kousalya, G., Adaptive and secure application partitioning for offloading in mobile cloud computing. Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Martnez, A., (eds.) Security in Computing and Communications Communications in Computer and Information Science, vol. 536, 2015, Springer International Publishing, 45–53, 10.1007/978-3-319-22915-7_5.
-
(2015)
Security in Computing and Communications, Communications in Computer and Information Science
, vol.536
, pp. 45-53
-
-
Dhanya, N.M.1
Kousalya, G.2
-
131
-
-
84939507944
-
Avatar: Mobile distributed computing in the cloud
-
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 151–156.
-
C. Borcea, X. Ding, N. Gehani, R. Curtmola, M. Khan, H. Debnath, Avatar: Mobile distributed computing in the cloud, in: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015, pp. 151–156. http://dx.doi.org/10.1109/MobileCloud.2015.22.
-
-
-
Borcea, C.1
Ding, X.2
Gehani, N.3
Curtmola, R.4
Khan, M.5
Debnath, H.6
-
132
-
-
84930511409
-
Cloud forensics: Technical challenges, solutions and comparative analysis
-
Pichan, A., Lazarescu, M., Soh, S.T., Cloud forensics: Technical challenges, solutions and comparative analysis. Digit. Invest. 13 (2015), 38–57, 10.1016/j.diin.2015.03.002.
-
(2015)
Digit. Invest.
, vol.13
, pp. 38-57
-
-
Pichan, A.1
Lazarescu, M.2
Soh, S.T.3
|