Mitigating Rural E-Learning Sustainability Challenges Using Cloud Computing Technology
SA Odunaike, OO Olugbara, SO Ojo - IAENG Transactions on Engineering …, 2014
... components including operating system, virtualization technology, resource man- agement,
e-learning platforms, collaboration, communication and security suites. ... Energy efficiency is
particularly considered critical for location based applications in mobile cloud computing [36]. ...
e-learning platforms, collaboration, communication and security suites. ... Energy efficiency is
particularly considered critical for location based applications in mobile cloud computing [36]. ...
A lightweight convergent personal mobile service delivery approach based on phone book
X Qiao, S Xue, J Chen, A Fensel - International Journal of Communication Systems, 2013
... cluster, is migrated on Eucalyptus,9 an open source cloud environment that provides various
scalability and cloud management tools. ... Moreover, if the mobile phone is lost, the user can delete
the contacts information in the lost phone to ... 5.3 Security and privacy protection issues. ...
scalability and cloud management tools. ... Moreover, if the mobile phone is lost, the user can delete
the contacts information in the lost phone to ... 5.3 Security and privacy protection issues. ...
Service models and pricing schemes for cloud computing
SH Chun, BS Choi - Cluster Computing, 2013
... benefit cars, re-location costs, expenses, overtime, consultancy Accommodation Offices, storage,
secure areas, utilities External service Security services, disaster ... Kim, H.-W., Jeong, Y.-S.: Visual
monitoring sys- tem of multi-hosts behavior for trustworthiness with mobile cloud. ...
secure areas, utilities External service Security services, disaster ... Kim, H.-W., Jeong, Y.-S.: Visual
monitoring sys- tem of multi-hosts behavior for trustworthiness with mobile cloud. ...
Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices
T Suga, T Nishide, K Sakurai - Security and Communication Networks, 2013
... Suga, T., Nishide, T. and Sakurai, K. (2013), Character-based symmetric searchable encryption
and its implementation and experiment on mobile devices. Security Comm. ... The advance in
computer and telecommunication technology made cloud computing widespread. ...
and its implementation and experiment on mobile devices. Security Comm. ... The advance in
computer and telecommunication technology made cloud computing widespread. ...
[PDF] Cloud Computing Management and Synchronization Tools
L Gehlod, V Jain, M Sharma - Computing, 2013
... client applications with heterogeneous platforms such as mobile phones and
personal computers. Cloud ... in cloud. cloud computing provide better security
mechanism to protect the user application and data. It enable ...
personal computers. Cloud ... in cloud. cloud computing provide better security
mechanism to protect the user application and data. It enable ...
A novel privacy preserving keyword searching for cloud storage
L Cheng, Z Jin, O Wen, H Zhang - Privacy, Security and Trust (PST), 2013 Eleventh …, 2013
... To avoid the security risks, we propose a privacy preserving keyword searching scheme whose
encryption ... I. INTRODUCTION Cloud storage is viewed as one of the most promising technologies
today, it allows users to use a thin client like a wireless PDA or a mobile phone to ...
encryption ... I. INTRODUCTION Cloud storage is viewed as one of the most promising technologies
today, it allows users to use a thin client like a wireless PDA or a mobile phone to ...
Operating Large Scale Systems and Cloud Services With Zero-Standing Elevated Permissions
A Macleod, A Lukyanov, C Nash, J Singh… - US Patent 20,130,239,166, 2013
... whether the user's account indicates that the user has undergone a security clearance and ... such
as deploying a new software service to production on a cloud server. ... a multitude of computing
systems, including wired and wireless computing systems, mobile computing systems ...
as deploying a new software service to production on a cloud server. ... a multitude of computing
systems, including wired and wireless computing systems, mobile computing systems ...
COMPUTER NETWORK, AN ELECTRONIC TRANSACTIONS CLOUD AND A COMPUTER-IMPLEMENTED METHOD FOR SECURE ELECTRONIC TRANSACTIONS
G Andreoli, M Dini, G Mutarelli - US Patent 20,130,238,502, 2013
... For example, the electronic transactions cloud may send an SMS message to an account
associated with the mobile device of ... Further, high security is provided by internet security standards
(HTTPS) and transaction are secured by the secure transaction code, eg a ...
associated with the mobile device of ... Further, high security is provided by internet security standards
(HTTPS) and transaction are secured by the secure transaction code, eg a ...
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps
CC Lee, CW Hsu, YM Lai, A Vasilakos - Journal of Medical Systems, 2013
... 013-0543-7. Li, M., Lou, W., and Ren, K., Data security and privacy ... and Lou, W., Scalable and
secure sharing of personal health records in cloud computing using ... X., SPOC: A secure and
privacy-preserving opportunistic computing framework for mobile-healthcare emergency. ...
secure sharing of personal health records in cloud computing using ... X., SPOC: A secure and
privacy-preserving opportunistic computing framework for mobile-healthcare emergency. ...
Interrogating Iran's Restricted Public Cloud: An Actor Network Theory Perspective
F Shirazi - Telematics and Informatics, 2013
... These issues may include security concerns associated with the use of shared resources,
embedded ... nationally supported Internet initiatives in the form of controlled public cloud networks. ...
developing countries, Iran has a promising number of Internet and mobile users but its ...
embedded ... nationally supported Internet initiatives in the form of controlled public cloud networks. ...
developing countries, Iran has a promising number of Internet and mobile users but its ...
Design and Evaluation of Mobile Offloading System for Web-Centric Devices
S Park, Q Chen, H Han, HY Yeom - Journal of Network and Computer Applications, 2013
... cloud network to the device. Issues pertaining to security cannot be neglected either,
as this architecture clones the complete image of a mobile system, include the user's
private files, in third-party cloud storage over the network. ...
as this architecture clones the complete image of a mobile system, include the user's
private files, in third-party cloud storage over the network. ...
[PDF] Asutuse sisene ainu-tarbijaga ettevõtte tarkvara andmekihi migratsioon Azure pilve keskkonda: Mitme-tarbijaga andmekihi juhtumiuuring
HI Karaca - 2013
... criteria. If security is one the most important factor for the target application, these kind of ...
2.3.1. Compute Compute provides a computational environment that consists of web sites,
cloud services, mobile services and virtual machines. Page 24. 24 ...
2.3.1. Compute Compute provides a computational environment that consists of web sites,
cloud services, mobile services and virtual machines. Page 24. 24 ...
Context-Aware Multimedia Distribution to Mobile Social Communities
FC Pinto, N Carapeto, A Videira, T Frazão, M Homem - International Journal of …, 2013
... Context-Aware Multimedia Distribution to Mobile Social Communities. ... MLA. Pinto, Filipe Cabral,
Nuno Carapeto, António Videira, Teresa Frazão and Mário Homem. "Context-Aware Multimedia
Distribution to Mobile Social Communities." IJHCR 4.3 (2013): 63-92. Web. 14 Sep. ...
Nuno Carapeto, António Videira, Teresa Frazão and Mário Homem. "Context-Aware Multimedia
Distribution to Mobile Social Communities." IJHCR 4.3 (2013): 63-92. Web. 14 Sep. ...
MOBILE LINK SYSTEM, METHOD & APPARATUS
S Hallem, M Bancroft - US Patent 20,130,238,808, 2013
... Enterprise Network, where a direct connection is used, or the gateway 104 may be deployed
in the Cloud 114 where ... A viewer 118 may be provided, for example, as an application on the
mobile device 108. ... The viewer 118 may be directly provided in order to increase security. ...
in the Cloud 114 where ... A viewer 118 may be provided, for example, as an application on the
mobile device 108. ... The viewer 118 may be directly provided in order to increase security. ...
METHOD AND APPARATUS FOR SECURING MOBILE APPLICATIONS
P Linga, AK Arora - US Patent 20,130,239,192, 2013
... The security system 120 includes filtering and load balancing 210, application services 220 ...
delivered computing environments such as, for example, Elastic Computer Cloud (EC2), Elastic ...
an illustration of sample operating system launcher screen of a mobile device, according ...
delivered computing environments such as, for example, Elastic Computer Cloud (EC2), Elastic ...
an illustration of sample operating system launcher screen of a mobile device, according ...
SYSTEMS AND METHODS FOR PROVIDING EDUCATIONAL PRODUCTS AND SERVICES VIA CLOUD MASSIVE ONLINE OPEN COURSE
AHB Zhou, X Zhou, T Dylan, TTG Zhou - US Patent 20,130,236,877, 2013
... client devices, such as desktop computers, laptops, tablet devices, mobile phones, wearable ...
Community cloud massive online open course 430 may share cloud education infrastructure ... 425,
425a from a specific community with common concerns (security, audit, commerce, etc ...
Community cloud massive online open course 430 may share cloud education infrastructure ... 425,
425a from a specific community with common concerns (security, audit, commerce, etc ...
CLOUD SERVICES SYSTEM
P Caminiti, P Trevisan, A Duminuco, S Tiberia… - US Patent 20,130,238,788, 2013
... 20040054790, Management of security objects controlling access to resources, March, 2004,
Himmel et al ... end user devices, such as laptops, personal computers, thin clients, mobile devices,
etc ... Cloud computing can be used for applications with varying or unpredictable demand ...
Himmel et al ... end user devices, such as laptops, personal computers, thin clients, mobile devices,
etc ... Cloud computing can be used for applications with varying or unpredictable demand ...
[PDF] Enhancing the Product Realization Process With Cloud-Based Design and Manufacturing Systems
JL Thames, DW Rosen, D Schaefer - innovation, 2013
... The DMCloud can provide such access to the net- work where DMCloud consumers reside
through multiple tools, eg, mobile phones and personal digital ... A DMCloud provider must also
manage security, ranging from physical security to virtual security. A cloud broker manages ...
through multiple tools, eg, mobile phones and personal digital ... A DMCloud provider must also
manage security, ranging from physical security to virtual security. A cloud broker manages ...
[PDF] Generating Effective Patrol Strategies to Enhance US Border Security
E Gutierrez, J Juett, C Kiekintveld - Journal of Strategic Security, 2013
... org; Nicola Gatti Nicola, Sofia Ceppi and Francesco Amigoni, "Extending Algorithms for Mobile
Robot Patrolling ... Gutierrez et al.: Generating Effective Patrol Strategies to Enhance US Border
Security ... on the grid could be changed to represent weather patterns, cloud positions, or ...
Robot Patrolling ... Gutierrez et al.: Generating Effective Patrol Strategies to Enhance US Border
Security ... on the grid could be changed to represent weather patterns, cloud positions, or ...
PRISM and privacy: will this change everything?
C Kuner, FH Cate, C Millard, DJB Svantesson - International Data Privacy Law, 2013
... current and emerging business models? Business models such as 'big data' and 'cloud
computing' are only viable if the individuals and companies using them have confidence
in the confidentiality and security of data processing. ...
computing' are only viable if the individuals and companies using them have confidence
in the confidentiality and security of data processing. ...
No comments:
Post a Comment