Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …

Mobile cloud computing models security issues: A systematic review

AS AlAhmad, H Kahtan, YI Alzoubi, O Ali… - Journal of Network and …, 2021 - Elsevier
Mobile cloud computing (MCC) is a trending technology employed in several domains to
overcome the limitations of mobile devices by using cloud capabilities. Communication …

Retracted article: dynamic resource allocation with optimized task scheduling and improved power management in cloud computing

J Praveenchandar, A Tamilarasi - Journal of Ambient Intelligence and …, 2021 - Springer
Cloud computing is one among the emerging platforms in business, IT enterprise and
mobile computing applications. Resources like Software, CPU, Memory and I/O devices etc …

Toward efficient service composition techniques in the internet of things

M Hamzei, NJ Navimipour - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is anticipated to bridge various technologies to allow new
applications through linking physical things together in the future. Increasing facilities …

An algorithm for detecting SQL injection vulnerability using black-box testing

MS Aliero, I Ghani, KN Qureshi, MF Rohani - Journal of Ambient …, 2020 - Springer
Abstract SQL Injection Attack (SQLIA) is one of the most severe attack that can be used
against web database-driven applications. Attackers use SQLIA to obtain unauthorized …

A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

Analysis of CoAP implementations for industrial Internet of Things: a survey

M Iglesias-Urkia, A Orive, A Urbieta… - Journal of Ambient …, 2019 - Springer
Over the last few years, the Internet of Things (IoT) has grown in protocols, implementations
and use cases. In terms of communication protocols, the Constrained Application Protocol …

Adaptive security architecture for protecting RESTful web services in enterprise computing environment

MI Beer, MF Hassan - Service Oriented Computing and Applications, 2018 - Springer
In this modern era of enterprise computing, the enterprise application integration (EAI) is a
well-known industry-recognized architectural principle that is built based on loosely coupled …

Secure sharing of personal health records in Jelastic cloud by attribute based encryption

S Maheswari, U Gudla - 2017 4th International Conference on …, 2017 - ieeexplore.ieee.org
Secure sharing of patient health records in Jelastic cloud provides the more benefits to the
data owners and end users. We know that building a specialized data center's is very difficult …

[HTML][HTML] Expediting the design and development of secure cloud-based mobile apps

FT Chimuco, JBF Sequeiros, TMC Simōes… - International Journal of …, 2024 - Springer
The adoption and popularity of mobile devices by end-users is partially driven by the
increasing development and availability of mobile applications that can aid solving different …