Towards Security as a Service to Protect the Critical Resources of Mobile Computing Devices.
Abdulrahman AlreshidiPublished in: CoRR (2019)
Keyphrases
- critical information
- mobile computing devices
- ubiquitous computing environments
- security services
- network access
- mobile devices
- data encryption
- cloud services
- resource discovery
- grid environment
- security issues
- network services
- service management
- critical infrastructure
- service oriented
- information security
- access control
- intrusion detection
- security policies
- information services
- computing resources
- computing environments
- service providers
- resource management
- protection mechanisms
- service discovery
- resource allocation
- network resources
- protocol specification
- web services
- service offerings
- application level
- privacy protection
- security protocols
- mobile services
- statistical databases
- distributed environment
- context aware
- management system
- end users