+

Gu et al., 2013 - Google Patents

Secure mobile cloud computing and security issues

Gu et al., 2013

Document ID
17930272312523424299
Author
Gu Q
Guirguis M
Publication year
Publication venue
High performance cloud auditing and applications

External Links

Snippet

The proliferation of mobile devices, coupled by the increase in their capabilities, have enabled the establishment of a rich mobile computing platform that can be utilized in conjunction with cloud services. In this chapter, we overview the latest mobile computing …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles

Similar Documents

Publication Publication Date Title
Rayes et al. Internet of things security and privacy
US11258773B2 (en) System and method for providing a privacy layer to secure client data in a network
Khan et al. Fog computing security: a review of current applications and security solutions
US10103892B2 (en) System and method for an endpoint hardware assisted network firewall in a security environment
Yi et al. Security and privacy issues of fog computing: A survey
Al-Janabi et al. Mobile cloud computing: challenges and future research directions
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
US8909930B2 (en) External reference monitor
US20160314299A1 (en) Mobile Device with Improved Security
JP6723263B2 (en) System and method for delegation of cloud computing processes
CN110659521A (en) Low overhead integrity protection with high availability for trust domains
US20090204964A1 (en) Distributed trusted virtualization platform
Jeong et al. An efficient authentication system of smart device using multi factors in mobile cloud service architecture
Mukherjee et al. Security and privacy issues and solutions for fog
Kumar et al. Exploring security issues and solutions in cloud computing services–a survey
Varadharajan et al. Counteracting security attacks in virtual machines in the cloud using property based attestation
Khan et al. A novel trusted hardware-based scalable security framework for IoT edge devices
Ismail et al. Mobile cloud database security: problems and solutions
Gu et al. Secure mobile cloud computing and security issues
Neware et al. Survey on security issues in mobile cloud computing and preventive measures
Sookhak et al. Security and privacy of smart cities: issues and challenge
Dumka et al. Security and challenges in mobile cloud computing
Gai et al. Introduction to Cybersecurity in the Internet of Things
Xu et al. Security architecture for federated mobile cloud computing
Padma et al. Mobile Cloud Computing: Issues from a Security Perspective
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载