Personalized Security Mechanism for Mobile Cloud Applications
Journal Title: Acta Technica Napocensis- Electronica-Telecomunicatii (Electronics and Telecommunications) - Year 2013, Vol 54, Issue 2
Abstract
Mobile Cloud Computing is a model that brings several advantages to the applications developed for mobile devices. In this paper, we focus on securing data used and processed by component-based mobile cloud applications. We first show some criteria that may affect the security properties (e.g. integrity, confidentiality and authenticity) applied to a component-based mobile cloud application data. Then, we describe a security solution that takes into account these criteria.
Authors and Affiliations
D. POPA, K. BOUDAOUD, M. CREMENE
Wave Iterative Process Study Of Double Dipole Scattering
The paper presents an application of the Wave Iterative Process (WIP) in the case of the study of the scattering of an electromagnetic plane wave by a system composed of two arbitrary placed metallic dipoles. The case of...
Multiple-Input Adaptive Combiner-Equalizer forWireless Communications
Receiver diversity is one of the most efficient techniques against fading and interference effects. MRC (Maximum Ratio Combining) was proven to ensure the highest diversity gain, but it is also the most complex compared...
Study of Effects of The Short Time Fourier Transform Configuration On EEG Spectral Estimates
EEG signals recorded from scalp contain useful information about the activity of a large number of neurons. Signal processing is needed to extract this information from the EEG signal. Here we study the effects of config...
Design of An Intelligent Systems for Monitoring and Assisting of Neoplazic Patients
The aim of this work is to create an intelligent client-server structure through which the neoplazic persons that use the opioid medicine to be monitorized and assisted at home, and also to efficiently intervene to lend...
Camera Phone Based Barcode Decoding System
We propose a 1D barcode acquisition and decoding system based on the use of J2ME enabled mobile phones. The approach relies on image processing techniques to correct the distortions introduces by the acquisition device,...