Strong authentication for mobile cloud computing.
Anis Ahmed-NacerMehdi Ahmed-NacerPublished in: NOTERE (2016)
Keyphrases
- cloud computing
- network access
- identity management
- middleware architecture
- computing resources
- data center
- secure manner
- data management
- big data
- internet services
- distributed computing
- service providers
- business models
- cloud computing environment
- mobile devices
- security issues
- computing technologies
- cloud computing platform
- mobile phone
- cloud storage
- mobile applications
- security mechanisms
- mobile computing
- mobile technologies
- computing platform
- map reduce
- mobile terminals
- cloud services
- computing environments
- load balancing
- computing infrastructure
- context aware
- mobile users
- databases