Secure Intelligent Information Management by Using a Framework of Virtual Phones based on Cloud Computation

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 468

This Paper With 15 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICMHCONF01_265

تاریخ نمایه سازی: 25 بهمن 1394

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. But these applications have problems of security, management and performance in business environments. Cloud systems provide information transfer, management facilities and security for virtual environments. Therefore, an innovative internet service and business model is proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhances performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Authors

Mohammad Hadi Khorashadi Zadeh

Department of IT Management, Islamic Azad University, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Assing, D., & Cale, S. (2013). Mobile acces safety: Beyond ...
  • Baratto, R. A. B., Potter, S., Su, G., & Nieh, ...
  • Bednar, J., Eskridge, W. N., & Ferejohn, F. (1999). A ...
  • Burt, J. (2011). BYOD Trend Pressures Corporate Networks. eWeek. Available ...
  • Chang, S. J. (2013). APE: A Smart Automatic Testing Environment ...
  • Dihn, H. D., Lee, C., Niyato, D., & Wang, W. ...
  • Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, ...
  • Han, D., Zhang, C., Fan, X., Hindle, A., Wong, K., ...
  • at: http : //dl , acm. org/citation. cfm?id= 1 924943, ...
  • Hung, S.-H., Shih, C.-S., Shieh, J.-P., Lee, C.-P., & Huang, ...
  • Hung, S.-H., Liang, F.-T., Tu, C.-H., & Chang, N. (2013). ...
  • PDFDC. (2011). 2011 C onsumerization of IT Study: Closing the ...
  • Kanaka. (2013). VNC client using HTML5 with encryption support. Available ...
  • Li, Q., & Clark, G. (2013). Mobile security: A look ...
  • Miller, K. W., Voas, J., & Hurlburt, G. F. (2012). ...
  • Protalinski, E. (2013). Juniper: Mobile malware is _ increasingly profit-driven ...
  • increas ing ly-pro fit-driven-bus iness-as- 9 2 _ _ f-al ...
  • Rhee, K., Won, D., Jang, S.-W., Chae, S., & Park, ...
  • Kelemen, R. D. (2007). Built to last? The durability of ...
  • Sacchi, J. (2012). Addressing Security Issues and Concerns of B ...
  • Webopedia. (2013). C onsumerization of IT. Available at: _ : ...
  • نمایش کامل مراجع