[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Al Ladan, 2016 - Google Patents

A review and a classifications of mobile cloud computing security issues

Al Ladan, 2016

Document ID
4472293952489404398
Author
Al Ladan M
Publication year
Publication venue
International Conference on Cyber Warfare and Security

External Links

Snippet

Cloud computing is one of the latest developments in the IT industry. It is an emerging technology paradigm that migrates current technological and computing concepts into utility- like solutions similar to electricity and water systems. In addition, with the popularity of …
Continue reading at books.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • H04W72/048Wireless resource allocation where an allocation plan is defined based on terminal or device properties
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • H04W72/0406Wireless resource allocation involving control information exchange between nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/06Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
    • H04W4/10Push-to-Talk mobile application services or Push-on-Call mobile application services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • H04W4/025Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks

Similar Documents

Publication Publication Date Title
Shafiq et al. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
US11438365B2 (en) Hierarchical risk assessment and remediation of threats in mobile networking environment
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
Delac et al. Emerging security threats for mobile platforms
Kulkarni et al. A security aspects in cloud computing
An et al. Reviews on security issues and challenges in cloud computing
Shah et al. Security issues on cloud computing
Singh et al. Security attacks taxonomy on bring your own devices (BYOD) model
Dini et al. Internet of Things security problems
Kumar et al. A survey on cloud computing security threats and vulnerabilities
Ennajjar et al. Security in cloud computing approaches and solutions
Butt et al. Cloud and its security impacts on managing a workforce remotely: a reflection to cover remote working challenges
Chaubey et al. Security, privacy and challenges in Mobile Cloud Computing (MCC):-a critical study and comparison
Aich et al. Study on cloud security risk and remedy
Christina Proactive measures on account hijacking in cloud computing network
Alotaibi et al. Mobile computing security: issues and requirements
Al Ladan A review and a classifications of mobile cloud computing security issues
Patel et al. Security hazards attacks and its prevention techniques in cloud computing: A detail review
Rai et al. Study of security risk and vulnerabilities of cloud computing
Borazjani Security issues in cloud computing
Nazir et al. Security threats with associated mitigation techniques in cloud computing
Jana et al. Efficient management of security and privacy issues in mobile cloud environment
Ullah et al. Tcloud: Challenges And Best Practices For Cloud Computing
Darwish et al. Privacy and security of cloud computing: a comprehensive review of techniques and challenges
Krishna et al. A Survey of Key Challenges in Integrating IoT and Cloud Security