Security of mobile cloud computing: A systematic mapping study
DXJ Juárez, P Cedillo - 2017 IEEE Second Ecuador Technical …, 2017 - ieeexplore.ieee.org
Cloud Computing has gained more prominence in organizations in the last years.
Meanwhile, ubiquity and mobility are two main features that have emerged from the …
Meanwhile, ubiquity and mobility are two main features that have emerged from the …
Tokenizing network appliance and method
D Schenk, E Leavens, M Carrafiello… - US Patent …, 2019 - Google Patents
An example security device receives a plurality of data units carrying traffic in a message
encoded in accordance with an application layer protocol for a server. The message …
encoded in accordance with an application layer protocol for a server. The message …
ANN based security in mobile cloud computing
Cloud computing is a promising new technology that is revolutionizing the old Internet
computing paradigm and the entire IT sector. Customers and many firms, such as Apple …
computing paradigm and the entire IT sector. Customers and many firms, such as Apple …
A security scheme for mobile cloud using multi-agents system
A Abdellaoui, A Laksantini… - 2016 4th IEEE …, 2016 - ieeexplore.ieee.org
With The advent of technologies such as 4G 5G, Smartphone and cloud computing, a new
technology has emerged it is the mobile cloud computing. It's a concept that exploits the …
technology has emerged it is the mobile cloud computing. It's a concept that exploits the …
Software release verification
Y Landman - US Patent 10,972,289, 2021 - Google Patents
The present disclosure provides a method, system, and device for verifying a software
release. To illustrate, as software (eg, one or more files or artifacts) completes one or more …
release. To illustrate, as software (eg, one or more files or artifacts) completes one or more …
[PDF][PDF] Securing Pci Data: Cloud Security Best Practices And Innovations
Abstract Protecting Payment Card Industry data in the cloud is becoming more complex
because of shared responsibility models, compliance issues, and threats. This paper …
because of shared responsibility models, compliance issues, and threats. This paper …
Leveraging crowdsourcing in cloud application development
The emergence of crowdsourcing has enabled workforce seekers to delegate various tasks
to the unknown public to accomplish. Crowdsourcing serves in Software development where …
to the unknown public to accomplish. Crowdsourcing serves in Software development where …
Efficient management of privacy issues in mobile cloud environment
D Jana, D Bandyopadhyay - 2015 IEEE International Advance …, 2015 - ieeexplore.ieee.org
Mobile application developers and users can feel a direct advantage within mobile based
cloud computing for overcoming the inherent constraints present in mobile devices-be it …
cloud computing for overcoming the inherent constraints present in mobile devices-be it …
[图书][B] A mechanism design for Crowdsourcing Multi-Objective Recommendation System
E Aldahari - 2019 - search.proquest.com
Crowdsourcing is an approach whereby requesters call for workers with different capabilities
to process a task for monetary reward. The emergence of crowdsourcing has drawn …
to process a task for monetary reward. The emergence of crowdsourcing has drawn …
An intelligent dietary planning mobile system with privacy-preserving mechanism
PS Wang, SW Chen, CH Kuo, CM Tu… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
In recent years, the rapid development of intelligent dietary planning mobile systems,
combined with the cloud technology, provides more intuitive and convenient experience for …
combined with the cloud technology, provides more intuitive and convenient experience for …