{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:49:33Z","timestamp":1744904973017,"version":"3.28.0"},"reference-count":72,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iwcmc.2013.6583636","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T15:31:30Z","timestamp":1377790290000},"page":"660-666","source":"Crossref","is-referenced-by-count":23,"title":["Challenges and opportunities of Mobile Cloud Computing"],"prefix":"10.1109","author":[{"given":"Mojtaba","family":"Alizadeh","sequence":"first","affiliation":[]},{"given":"Wan Haslina","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/MDM.2010.78","article-title":"Mobile community cloud computing: Emerges and evolves","author":"kovachev","year":"2010","journal-title":"Mobile Data Management (MDM) 2010 Eleventh International Conference on"},{"key":"36","first-page":"125","article-title":"Can a mobile cloud be more trustworthy than a traditional cloud?","author":"ali","year":"2011","journal-title":"3rd ICST Conference on Security and Privacy for Mobile Information and Communication Systems"},{"key":"33","first-page":"1","article-title":"Cloud computing research and security issues","author":"jianfeng","year":"2010","journal-title":"Computational Intelligence and Software Engineering (CiSE) 2010 International Conference on"},{"key":"34","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7105.001.0001","author":"rheingold","year":"2000","journal-title":"The Virtual Community Homesteading on the Electronic Frontier"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/1639950.1639958"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045111"},{"key":"38","article-title":"Mobile cloud computing: Devices, trends, issues, and the enabling technologies","author":"cox","year":"2011","journal-title":"IBM Developer Works"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2010.2065891"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2008.4738445"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180455"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2010.102"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1710420"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2010.5580762"},{"key":"69","first-page":"4","article-title":"Energy efficiency of mobile clients in cloud computing","author":"miettinen","year":"2010","journal-title":"Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCW.2012.6316466"},{"key":"22","first-page":"6","article-title":"Smartphone threats and security technology","volume":"25","author":"kang","year":"2010","journal-title":"Trend Analysis of Electronics and Communication"},{"key":"23","article-title":"Security and performance evaluation of lightweight cryptographic algorithms in RFID","author":"alizadeh","year":"2012","journal-title":"International Journal WSEAS on Communications"},{"key":"24","first-page":"15","article-title":"A survey on attacks in RFID networks","volume":"1","author":"alizadeh","year":"2012","journal-title":"Open International Journal of Informatics"},{"key":"25","first-page":"145","volume":"800","author":"mell","year":"2011","journal-title":"The NIST Definition of Cloud Computing (Draft)"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.187"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"journal-title":"Draft NIST Working Definition of Cloud Computing","year":"2009","author":"mell","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"journal-title":"Above the Clouds A Berkeley View of Cloud Computing","year":"2009","author":"armbrust","key":"3"},{"key":"2","article-title":"Head in the clouds-The power of infrastructure as a service","author":"vogels","year":"2008","journal-title":"First Workshop on Cloud Computing and in Applications (CCA'08)(October 2008)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"7","first-page":"475","article-title":"A brief survey on the security model of cloud computing","author":"xue","year":"2010","journal-title":"9th International Symposium on Distributed Computing and Applications to Business Engineering and Science"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27317-9_36"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.218"},{"key":"5","first-page":"1","author":"carolan","year":"2009","journal-title":"Introduction to Cloud Computing Architecture"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"4","first-page":"37","article-title":"Associated risks of cloud computing for SMEs","volume":"1","author":"azarnik","year":"2012","journal-title":"Open International Journal of Informatics"},{"journal-title":"Cloud Computing","year":"2010","author":"velte","key":"31"},{"key":"70","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/978-3-540-76778-7_8","article-title":"Interactive resource-intensive applications made easy","volume":"4834","author":"lagar-cavilla","year":"2007","journal-title":"Middleware 2007"},{"key":"71","first-page":"58","article-title":"Architecture of mobile application, security issues and services involved in mobile cloud computing environment","volume":"1","author":"saini","year":"2012","journal-title":"IJCER"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.08.003"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2011.6141288"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994695"},{"key":"58","first-page":"459","article-title":"Phosphor: A cloud based DRM scheme with sim card","author":"peng","year":"2010","journal-title":"Web Conference (APWEB) 2010 12th International Asia-Pacific"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1145\/1622103.1629656"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655026"},{"key":"19","first-page":"460","article-title":"Enhancing security in mobile cloud computing","volume":"28","author":"singh","year":"2012","journal-title":"Proceedings of M4D 2012 28-29"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"17","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","article-title":"Cloud computing: State-of-The-art and research challenges","volume":"1","author":"zhang","year":"2010","journal-title":"Journal of Internet Services and Applications"},{"key":"18","first-page":"464","article-title":"A tale of clouds: Paradigm comparisons and some thoughts on research issues","author":"lijun","year":"2008","journal-title":"Asia-Pacific Services Computing Conference"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"13","first-page":"1","author":"modi","year":"2012","journal-title":"A Survey on Security Issues and Solutions at Different Layers of Cloud Computing"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.006"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-010-0140-x"},{"key":"12","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/978-3-642-22726-4_46","article-title":"Cloud computing security issues and challenges: A survey","author":"verma","year":"2011","journal-title":"1st International Conference on Advances in Computing and Communications"},{"key":"21","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/978-94-007-2598-0_18","article-title":"SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing","volume":"107","author":"park","year":"2011","journal-title":"IT Convergence and Services"},{"key":"20","article-title":"Mobile cloud computing security considerations","volume":"9","author":"ko","year":"2012","journal-title":"Journal of Security Engineering"},{"key":"64","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-642-13119-6_2","article-title":"Inter cloud: Utility-oriented federation of cloud computing environments for scaling of application services","volume":"6081","author":"buyya","year":"2010","journal-title":"Algorithms and Architectures for Parallel Processing"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"key":"62","first-page":"184","article-title":"A security framework of group location-based mobile applications in cloud computing","author":"yu-jia","year":"2011","journal-title":"Parallel Processing Workshops (ICPPW) 2011 40th International Conference on"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2012.25"},{"year":"0","key":"60"},{"year":"0","key":"61"},{"key":"49","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/978-3-540-28641-7_3","article-title":"Energy consumption in mobile devices: Why future systems need requirements-aware energy scale-down","volume":"3164","author":"mayo","year":"2005","journal-title":"Power-Aware Computer Systems"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/ISEE.1993.302825"},{"journal-title":"Exploiting Rich Mobile Environments","year":"2005","author":"chang","key":"45"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2010.214"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160049"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2002.1106739"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.537"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2002.1016867"},{"key":"52","first-page":"115","article-title":"A compilation framework for power and energy management on mobile computers","volume":"2624","author":"kremer","year":"2003","journal-title":"Languages and Compilers for Parallel Computing"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2011.67"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1145\/584007.584008"}],"event":{"name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013)","start":{"date-parts":[[2013,7,1]]},"location":"Sardinia, Italy","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6578011\/6583517\/06583636.pdf?arnumber=6583636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T12:31:21Z","timestamp":1563798681000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6583636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2013.6583636","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}