Gu et al., 2013 - Google Patents
Secure mobile cloud computing and security issuesGu et al., 2013
View PDF- Document ID
- 17930272312523424299
- Author
- Gu Q
- Guirguis M
- Publication year
- Publication venue
- High performance cloud auditing and applications
External Links
Snippet
The proliferation of mobile devices, coupled by the increase in their capabilities, have enabled the establishment of a rich mobile computing platform that can be utilized in conjunction with cloud services. In this chapter, we overview the latest mobile computing …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mollah et al. | Security and privacy challenges in mobile cloud computing: Survey and way ahead | |
Rayes et al. | Internet of things security and privacy | |
Kumari et al. | A taxonomy of blockchain-enabled softwarization for secure UAV network | |
Khan et al. | Fog computing security: a review of current applications and security solutions | |
US10103892B2 (en) | System and method for an endpoint hardware assisted network firewall in a security environment | |
Yi et al. | Security and privacy issues of fog computing: A survey | |
US20220158981A1 (en) | System and method for providing a privacy layer to secure client data in a network | |
Al-Janabi et al. | Mobile cloud computing: challenges and future research directions | |
Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
US8909930B2 (en) | External reference monitor | |
La Polla et al. | A survey on security for mobile devices | |
JP6723263B2 (en) | System and method for delegation of cloud computing processes | |
US20160314299A1 (en) | Mobile Device with Improved Security | |
CN110659521A (en) | Low overhead integrity protection with high availability for trust domains | |
Jeong et al. | An efficient authentication system of smart device using multi factors in mobile cloud service architecture | |
Mukherjee et al. | Security and privacy issues and solutions for fog | |
Varadharajan et al. | Counteracting security attacks in virtual machines in the cloud using property based attestation | |
Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
Gu et al. | Secure mobile cloud computing and security issues | |
Ismail et al. | Mobile cloud database security: problems and solutions | |
Khan et al. | A novel trusted hardware-based scalable security framework for IoT edge devices | |
Sookhak et al. | Security and privacy of smart cities: issues and challenge | |
Neware et al. | Survey on Security Issues in Mobile Cloud Computing and Preventive Measures | |
Padma et al. | Mobile Cloud Computing: Issues from a Security Perspective | |
Xu et al. | Security architecture for federated mobile cloud computing |