Al Ladan, 2016 - Google Patents
A review and a classifications of mobile cloud computing security issuesAl Ladan, 2016
- Document ID
- 4472293952489404398
- Author
- Al Ladan M
- Publication year
- Publication venue
- International Conference on Cyber Warfare and Security
External Links
Snippet
Cloud computing is one of the latest developments in the IT industry. It is an emerging technology paradigm that migrates current technological and computing concepts into utility- like solutions similar to electricity and water systems. In addition, with the popularity of …
- 238000005516 engineering process 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
- H04W72/048—Wireless resource allocation where an allocation plan is defined based on terminal or device properties
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
- H04W72/0406—Wireless resource allocation involving control information exchange between nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
- H04W4/10—Push-to-Talk mobile application services or Push-on-Call mobile application services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/025—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
US11438365B2 (en) | Hierarchical risk assessment and remediation of threats in mobile networking environment | |
Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
Delac et al. | Emerging security threats for mobile platforms | |
Kulkarni et al. | A security aspects in cloud computing | |
An et al. | Reviews on security issues and challenges in cloud computing | |
Shah et al. | Security issues on cloud computing | |
Singh et al. | Security attacks taxonomy on bring your own devices (BYOD) model | |
Dini et al. | Internet of Things security problems | |
Kumar et al. | A survey on cloud computing security threats and vulnerabilities | |
Ennajjar et al. | Security in cloud computing approaches and solutions | |
Butt et al. | Cloud and its security impacts on managing a workforce remotely: a reflection to cover remote working challenges | |
Chaubey et al. | Security, privacy and challenges in Mobile Cloud Computing (MCC):-a critical study and comparison | |
Aich et al. | Study on cloud security risk and remedy | |
Christina | Proactive measures on account hijacking in cloud computing network | |
Alotaibi et al. | Mobile computing security: issues and requirements | |
Al Ladan | A review and a classifications of mobile cloud computing security issues | |
Patel et al. | Security hazards attacks and its prevention techniques in cloud computing: A detail review | |
Rai et al. | Study of security risk and vulnerabilities of cloud computing | |
Borazjani | Security issues in cloud computing | |
Nazir et al. | Security threats with associated mitigation techniques in cloud computing | |
Jana et al. | Efficient management of security and privacy issues in mobile cloud environment | |
Ullah et al. | Tcloud: Challenges And Best Practices For Cloud Computing | |
Darwish et al. | Privacy and security of cloud computing: a comprehensive review of techniques and challenges | |
Krishna et al. | A Survey of Key Challenges in Integrating IoT and Cloud Security |