Skip to main content
Top

2013 | CompoundObjectErratum | Chapter

Erratum to: Information Technology Convergence

Authors : James J. (Jong Hyuk) Park, Leonard Barolli, Fatos Xhafa, Hwa Young Jeong

Published in: Information Technology Convergence

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Excerpt

The following chapter title along with the text should read as last chapter of this book. …

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Dinh HT, Lee C, Niyato D, Wang P (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, Oct 2011 Dinh HT, Lee C, Niyato D, Wang P (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, Oct 2011
2.
go back to reference Kang DH, Han JH, Lee YK, Cho YS, Han SW, Kim JN, Cho HS (2010) Smartphone threats and security technology. Telectronics Telecommun Trends 25(3):72–80 Kang DH, Han JH, Lee YK, Cho YS, Han SW, Kim JN, Cho HS (2010) Smartphone threats and security technology. Telectronics Telecommun Trends 25(3):72–80
3.
go back to reference Kim K, Kang DH (2009) Smartphone security technology in an open mobile environment. J KIISC 19(5):21–28 Kim K, Kang DH (2009) Smartphone security technology in an open mobile environment. J KIISC 19(5):21–28
4.
go back to reference Berger S, Cáceres R, Goldman KA, Perez R, Sailer R, van Doorn L (2006) vTPM: virtualizing the trusted platform module. In: Proceedings of the 15th conference on USENIX security symposium, vol 15. USENIX Association, USA Berger S, Cáceres R, Goldman KA, Perez R, Sailer R, van Doorn L (2006) vTPM: virtualizing the trusted platform module. In: Proceedings of the 15th conference on USENIX security symposium, vol 15. USENIX Association, USA
5.
go back to reference Huang D, Zhou Z, Xu L, Xing T, Zhong Y (2011) Secure data processing framework for mobile cloud computing. IEEE INFOCOM 2011 workshop on cloud computing Huang D, Zhou Z, Xu L, Xing T, Zhong Y (2011) Secure data processing framework for mobile cloud computing. IEEE INFOCOM 2011 workshop on cloud computing
6.
go back to reference Hada PS, Singh R, Manmohan M (2011) Security agents: a mobile agent based trust model for cloud computing. Int J Comput Appl 36(12):12–15 Hada PS, Singh R, Manmohan M (2011) Security agents: a mobile agent based trust model for cloud computing. Int J Comput Appl 36(12):12–15
8.
go back to reference Achemlal M, Gharout S, Gaber C (2011) Trusted platform module as an enabler for security in cloud computing. Proceedings of the conference on network and information systems security (SAR-SSI), 2011, IEEE, May 2011 Achemlal M, Gharout S, Gaber C (2011) Trusted platform module as an enabler for security in cloud computing. Proceedings of the conference on network and information systems security (SAR-SSI), 2011, IEEE, May 2011
9.
go back to reference Rocha F, Abreu S, Correia M (2011) The final frontier: confidentiality and privacy in the cloud. Computer 44(9):44–50 Rocha F, Abreu S, Correia M (2011) The final frontier: confidentiality and privacy in the cloud. Computer 44(9):44–50
10.
go back to reference Kumar K (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43(4):51–56 Kumar K (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43(4):51–56
Metadata
Title
Erratum to: Information Technology Convergence
Authors
James J. (Jong Hyuk) Park
Leonard Barolli
Fatos Xhafa
Hwa Young Jeong
Copyright Year
2013
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6996-0_114