References
[1]. Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., &
Buyya,
R. (2013). “Cloud-Based Augmentation for Mobile
Devices : Motivation, Taxonomies, and Open
Challenges”, IEEE Communications Surveys & Tutorials,
pp. 1–32. doi:10.1109/SURV.2013.070813.00285.
[2]. Chen, X., Liu, J., Han, J., & Xu, H. (2010).
“Primary
Exploration of Mobile Learning Mode under a Cloud Computing Environment
”, Proceedings of the
International Conference on E-Health Networking, Digital
Ecosystems and Technologies (EDT), Vol. 2, pp. 484-487.
[3]. Dai, J. & Zhou, Q. (2010). “A PKI-based
mechanism for
secure and efficient access to outsourced data”,
Proceedings of the 2nd International Conference on
Networking and Digital Society, Vol. 1, pp. 640.
[4]. Dinh, H. T., Lee, C., Niyato, D., & Wang, P.
(2010). “A
Survey of Mobile Cloud Computing: Architecture,
Applications, and Approaches”, The School of Computer
Engineering, Nanyang Technological University,
Singapore. Retrieved from http://onlinelibrar y
.wiley.com/doi/10.1002/wcm.1203.
[5]. Donald, A.C., Arul, S. O., & Arockiam, L. (2013).
“Mobile Cloud Security Issues and Challenges: A
Perspective”, International Journal of Engineering and
Innovative Technology, Vol. 3(1), ISSN: 2277-3754, ISO
9001:2008 Certified.
[6]. Kopec, D., Kabir, M. H., Reinharth, D., Rothschild,
O.,
& Castiglione, J. A. (2003). “Human Errors in Medical
Practice: Systematic Classification and Reduction with
Automated Information Systems”, Journal of Medical
Systems, Vol. 27(4), pp. 297 - 313.
[7]. La, H.H., & Kim, S.D. (2010). “A Conceptual
Framework
for Provisioning Context-aware Mobile Cloud Services”,
Proceedings of the 3rd IEEE International Conference on
Cloud Computing (CLOUD). pp. 466.
[8]. Li, H., & Hua, S. (2010). “Melog: mobile
experience
sharing through automatic multimedia blogging”,
Proceedings of the 2010 ACM multimedia workshop on
Mobile cloud media computing (MCMC), pp. 19-24.
[9]. Li, Z., Wang, C., & Xu, R. (2001).
“Computation
offloading to save energy on handheld devices: a
partition scheme”, Proceedings of the 2001 international
conference on Compilers, architecture, and synthesis for
embedded systems (CASES). pp. 238 - 246.
[10]. Morshed, M. S., Jahan, M. M., Islam, M. K., Huq,
M.,
Hossain S., & Basher, M. A. (2011). “Integration of Wireless
Hand-Held Devices with the Cloud Architecture: Security
and Privacy Issues”, International Conference on P2P,
Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 83-88.
[11]. Nasir, A. K., Kiah, M.L., Samee, U. K., &
Sajjad, A. M.,
(2012). “Towards secure mobile cloud computing: A
survey”, Future Generation Computer Systems, Vol. 29(5),
pp. 1278-1299.
[12]. Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn,
J., & Jahanian, F. (2008). “Virtualized incloud security
services for mobile devices”, Proceedings of the First
Workshop on Virtualization in Mobile Computing, pp. 31-
35.
[13]. Portokalidis, G., Homburg, P., Anagnostakis, K.,
&
Bos, H., (2010). “Paranoid Android: versatile protection for
smart-phones”, 26th Annual Computer Security
Application Conference (ACSAC). pp. 347-356.
[14]. Samimi, F. A., Mckinley, P. K., & Sadjadi S. M.
(2006).
“Mobile Service Clouds: A Self-Managing Infrastructure for
Autonomic Mobile Computing Services”, Proceedings of
the 2nd International Workshop on Self-Managed
Networks, Systems & Services (SelfMan), pp. 130-141.
[15]. Satyanarayanan, M. (1996). “Fundamental
challenges in mobile computing”, Proceedings of the 5th
annual ACM symposium on Principles of distributed
computing, pp. 1-7.
[16]. Satyanarayanan, M. (2010). “Mobile computing:
the next decade”, Proceedings of the 1st ACM Workshop
on Mobile Cloud Computing & Services: Social Networks
and Beyond (MCS).
[17]. Shahzad, A., & Hussain, M. (2013).
“Security Issues
and Challenges of Mobile Cloud Computing”,
International Journal of Grid and Distributed Computing,
Vol.6(6), pp. 37-50, ISSN: 2005-4262, doi:10.14257/
ijgdc.2013.6.6.04.
[18]. Tayade, D. (2014). “Mobile Cloud Computing :
Issues, Security,Advantages, Trends”, International
Journal of Computer Science and Information
Technologies, Vol. 5(5), pp. 6635-6639, ISSN: 0975-9646.
[19]. Yang, X., Pan, T., & Shen, J. (2010). “On
3G Mobile Ecommerce
Platform Based on Cloud Computing”,
Proceedings of the 3rd IEEE International Conference on
Ubi-Media Computing, pp. 198-201.
[20]. Zhangwei, H., & Mingjun, X (2010). “A
Distributed
Spatial Cloaking Protocol for Location Privacy”, 2nd Intl Conf on
Networks Security Wireless Communications and
Trusted Computing (NSWCTC). Vol. 2, pp. 468.