Authentication in mobile cloud computing: A survey.
Mojtaba AlizadehSaeid AbolfazliMazdak ZamaniSabariah BaharunKouichi SakuraiPublished in: J. Netw. Comput. Appl. (2016)
Keyphrases
- cloud computing
- network access
- identity management
- middleware architecture
- secure manner
- computing resources
- cloud computing environment
- data center
- internet services
- distributed computing
- big data
- data management
- mobile phone
- business models
- service providers
- mobile learning
- computing technologies
- security issues
- mobile devices
- computing platform
- mobile computing
- security mechanisms
- mobile technologies
- service level agreements
- mobile applications
- computing environments
- context aware
- databases
- cloud computing platform
- map reduce
- mobile users
- cloud platform
- low cost