Pub Date : 2019-10-11DOI: 10.1002/9781119593171.ch5
S. Sahana, D. Sarddar
{"title":"Application Safety and Service Vulnerability in Cloud Network","authors":"S. Sahana, D. Sarddar","doi":"10.1002/9781119593171.ch5","DOIUrl":"https://doi.org/10.1002/9781119593171.ch5","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131674377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-11DOI: 10.1002/9781119593171.ch2
Sushruta Mishra, Nitin Tripathy, B. K. Mishra, Chandrakanta Mahanty
{"title":"Analysis of Security Issues in Cloud Environment","authors":"Sushruta Mishra, Nitin Tripathy, B. K. Mishra, Chandrakanta Mahanty","doi":"10.1002/9781119593171.ch2","DOIUrl":"https://doi.org/10.1002/9781119593171.ch2","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126624495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-11DOI: 10.1002/9781119593171.ch16
Alok R. Prusty
{"title":"Cyberspace for Smart Parenting with Sensors","authors":"Alok R. Prusty","doi":"10.1002/9781119593171.ch16","DOIUrl":"https://doi.org/10.1002/9781119593171.ch16","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114402852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.1002/9781119593171.ch9
Shankey Garg, J. Chatterjee, Dac-Nhuong Le
{"title":"Implementation of Rest Architecure‐Based Energy‐Efficient Home Automation System","authors":"Shankey Garg, J. Chatterjee, Dac-Nhuong Le","doi":"10.1002/9781119593171.ch9","DOIUrl":"https://doi.org/10.1002/9781119593171.ch9","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123561458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.1002/9781119593171.ch1
Anindita Desarkar, Ajanta Das
{"title":"Encryption Algorithm for Data Security in Cloud Computing","authors":"Anindita Desarkar, Ajanta Das","doi":"10.1002/9781119593171.ch1","DOIUrl":"https://doi.org/10.1002/9781119593171.ch1","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.1002/9781119593171.ch11
Sushree Bibhuprada, Dac-Nhuong Le, B. Priyadarshini
{"title":"The Role of Information‐Centric Security in the Modern Arena of Information Technology","authors":"Sushree Bibhuprada, Dac-Nhuong Le, B. Priyadarshini","doi":"10.1002/9781119593171.ch11","DOIUrl":"https://doi.org/10.1002/9781119593171.ch11","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132791617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.1002/9781119593171.ch14
Sumit Bansal, Mayank Aggarwal, H. Aggarwal
{"title":"Advancements and Applications in Fog Computing","authors":"Sumit Bansal, Mayank Aggarwal, H. Aggarwal","doi":"10.1002/9781119593171.ch14","DOIUrl":"https://doi.org/10.1002/9781119593171.ch14","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115234577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.1002/9781119593171.ch12
Bhumi Dobaria, C. Bhatt
{"title":"Enabling Mobile Technology for Healthcare Service Improvements","authors":"Bhumi Dobaria, C. Bhatt","doi":"10.1002/9781119593171.ch12","DOIUrl":"https://doi.org/10.1002/9781119593171.ch12","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127073547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.1002/9781119593171.ch4
J. Chatterjee, Ishaani Priyadarshini, Shankeys, Dac-Nhuong Le
{"title":"Fog Computing and Its security issues","authors":"J. Chatterjee, Ishaani Priyadarshini, Shankeys, Dac-Nhuong Le","doi":"10.1002/9781119593171.ch4","DOIUrl":"https://doi.org/10.1002/9781119593171.ch4","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"53 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.1002/9781119593171.ch3
A. Dumka, M. Memoria, Alaknanda Ashok
{"title":"Security and Challenges in Mobile Cloud Computing","authors":"A. Dumka, M. Memoria, Alaknanda Ashok","doi":"10.1002/9781119593171.ch3","DOIUrl":"https://doi.org/10.1002/9781119593171.ch3","url":null,"abstract":"","PeriodicalId":285772,"journal":{"name":"Security Designs for the Cloud, Iot, and Social Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131584563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}