Gu et al., 2013 - Google Patents
Secure mobile cloud computing and security issuesGu et al., 2013
- Document ID
- 17930272312523424299
- Author
- Gu Q
- Guirguis M
- Publication year
- Publication venue
- High performance cloud auditing and applications
External Links
Snippet
The proliferation of mobile devices, coupled by the increase in their capabilities, have enabled the establishment of a rich mobile computing platform that can be utilized in conjunction with cloud services. In this chapter, we overview the latest mobile computing …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rayes et al. | Internet of things security and privacy | |
| US11258773B2 (en) | System and method for providing a privacy layer to secure client data in a network | |
| Khan et al. | Fog computing security: a review of current applications and security solutions | |
| US10103892B2 (en) | System and method for an endpoint hardware assisted network firewall in a security environment | |
| Yi et al. | Security and privacy issues of fog computing: A survey | |
| Al-Janabi et al. | Mobile cloud computing: challenges and future research directions | |
| Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
| US8909930B2 (en) | External reference monitor | |
| US20160314299A1 (en) | Mobile Device with Improved Security | |
| JP6723263B2 (en) | System and method for delegation of cloud computing processes | |
| CN110659521A (en) | Low overhead integrity protection with high availability for trust domains | |
| US20090204964A1 (en) | Distributed trusted virtualization platform | |
| Jeong et al. | An efficient authentication system of smart device using multi factors in mobile cloud service architecture | |
| Mukherjee et al. | Security and privacy issues and solutions for fog | |
| Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
| Varadharajan et al. | Counteracting security attacks in virtual machines in the cloud using property based attestation | |
| Khan et al. | A novel trusted hardware-based scalable security framework for IoT edge devices | |
| Ismail et al. | Mobile cloud database security: problems and solutions | |
| Gu et al. | Secure mobile cloud computing and security issues | |
| Neware et al. | Survey on security issues in mobile cloud computing and preventive measures | |
| Sookhak et al. | Security and privacy of smart cities: issues and challenge | |
| Dumka et al. | Security and challenges in mobile cloud computing | |
| Gai et al. | Introduction to Cybersecurity in the Internet of Things | |
| Xu et al. | Security architecture for federated mobile cloud computing | |
| Padma et al. | Mobile Cloud Computing: Issues from a Security Perspective |