[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Li et al., 2015 - Google Patents

Robust access control framework for mobile cloud computing network

Li et al., 2015

View PDF
Document ID
18102065755360362484
Author
Li F
Rahulamathavan Y
Conti M
Rajarajan M
Publication year
Publication venue
Computer Communications

External Links

Snippet

Unified communications has enabled seamless data sharing between multiple devices running on various platforms. Traditionally, organizations use local servers to store data and employees access the data using desktops with predefined security policies. In the era of …
Continue reading at openaccess.city.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power Management, i.e. event-based initiation of power-saving mode
    • G06F1/3234Action, measure or step performed to reduce power consumption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power Management, i.e. event-based initiation of power-saving mode
    • G06F1/3206Monitoring a parameter, a device or an event triggering a change in power modality

Similar Documents

Publication Publication Date Title
Li et al. Robust access control framework for mobile cloud computing network
Liu et al. A survey on secure data analytics in edge computing
Yousefnezhad et al. Security in product lifecycle of IoT devices: A survey
Harbi et al. A review of security in internet of things
Jayaraman et al. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
Ferrag et al. Privacy-preserving schemes for ad hoc social networks: A survey
Zhang et al. Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications
Kalaria et al. A Secure Mutual authentication approach to fog computing environment
Agrawal et al. A trustworthy agent-based encrypted access control method for mobile cloud computing environment
Qiao et al. Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing
Park et al. A selective group authentication scheme for IoT-based medical information system
Hasan et al. WORAL: A witness oriented secure location provenance framework for mobile devices
Kotha et al. A comprehensive review on secure data sharing in cloud environment
Zheng et al. An adaptive access control scheme based on trust degrees for edge computing
Badar et al. Secure authentication protocol for home area network in smart grid-based smart cities
Junejo et al. A Lightweight Attribute‐Based Security Scheme for Fog‐Enabled Cyber Physical Systems
Li et al. LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment
SC et al. Secure session key pairing and a lightweight key authentication scheme for liable drone services
Yan et al. Heterogeneous data access control based on trust and reputation in mobile cloud computing
Belguith et al. Coop-daab: Cooperative attribute based data aggregation for internet of things applications
Ma et al. Edge computing assisted an efficient privacy protection layered data aggregation scheme for IIoT
Tsai et al. Secure data-sharing using distributed environmental matching keys
Chatterjee et al. A survey on user access control in wireless sensor networks with formal security verification
Mohammedi et al. Energy-aware key management and access control for the internet of things
Zhang et al. Multidomain security authentication for the Internet of things