Mobile cloud computing: models, implementation, and security
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press, Taylor & Francis Group
[2017]
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030320821&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030320821&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Includes bibliographical references (pages 265-276) and index |
Umfang: | xxxii, 288 pages 24 cm |
ISBN: | 9781498796033 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044927680 | ||
003 | DE-604 | ||
005 | 20230607 | ||
007 | t| | ||
008 | 180503s2017 xxu |||| 00||| eng d | ||
010 | |a 017002243 | ||
020 | |a 9781498796033 |9 978-1-4987-9603-3 | ||
035 | |a (OCoLC)983226802 | ||
035 | |a (DE-599)BVBBV044927680 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-703 | ||
050 | 0 | |a QA76.585 | |
082 | 0 | |a 004.67/82 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Qiu, Meikang |e Verfasser |0 (DE-588)1013594762 |4 aut | |
245 | 1 | 0 | |a Mobile cloud computing |b models, implementation, and security |c Meikang Qiu, Pace University, New York City, New York, USA, Keke Gai, Pace University, New York City, New York, USA |
264 | 1 | |a Boca Raton |b CRC Press, Taylor & Francis Group |c [2017] | |
300 | |a xxxii, 288 pages |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 265-276) and index | ||
650 | 4 | |a Cloud computing | |
650 | 4 | |a Mobile computing | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 0 | 1 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Gai, Keke |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030320821&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030320821&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030320821 |
Datensatz im Suchindex
_version_ | 1819339708645244928 |
---|---|
adam_text | Contents
A
List of Figures xvii
List of Tables xxiii
Preface XXV
About the Authors xxvii
Introduction xxix
Part I Basic Concepts and Mechanisms of Mobile
Cloud Computing
Chapter 1 ■ Overview of Cloud Computing 3
1.1 INTRODUCTION 5
1.2 CONCEPT OF CLOUD COMPUTING 5
1.3 CHARACTERISTICS OF CLOUD COMPUTING 6
1.4 BASIC CLOUD COMPUTING SERVICE MODELS 7
1.4.1 Infrastrueture-as-a-Service 8
1.4.2 Platform-as-a-Service 10
1.4.3 Software-as-a-Service 13
1.5 CLOUD SERVICES DEPLOYMENTS 14
1.5.1 Public Cloud Computing 14
1.5.2 Private Cloud Computing 15
1.5.3 Community Cloud Computing 15
1.5.4 Hybrid Cloud Computing 15
1.6 SUMMARY 16
Vll
viii ■ Contents
1.7 EXERCISES 16
1.8 GLOSSARY 17
Chapter 2 ■ Specific Cloud Service Models 19
2.1 DESKTOP-AS-A-SERVICE 20
2.2 STORAGE-AS-A-SERVICE 21
2.2.1 Main Concepts 21
2.2.2 Benefits and Drawbacks 22
2.3 DATABASE-AS-A-SERVICE 24
2.3.1 Main Concepts 24
2.3.2 Benefits and Drawbacks 24
2.4 BACKEND-AS-A-SERVICE 26
2.5 INFO RM ATION-AS-A-SERVICE 28
2.6 INTEGRATION-AS-A-SERVICE 29
2.7 SECURITY-AS-A-SERVICE 32
2.8 M AN AGEMENT/GOVERNANCE-AS-A-SERVICE 34
2.8.1 Main Concepts 34
2.8.2 Mechanism 35
2.9 OTHER SPECIFIC CLOUD SERVICE MODELS 38
2.10 SUMMARY 38
2.11 EXERCISES 39
2.12 GLOSSARY 41
Chapter 3 ■ Basic Mechanisms and Principles of Mobile
Cloud Computing 43
3.1 INTRODUCTION 44
3.1.1 Concepts 44
3.1.2 Fundamental Components 46
3.2 MOBILE COMPUTING 47
3.3 WIRELESS NETWORKS 48
3.4 MAIN TECHNIQUES IN CLOUD COMPUTING 52
Contents ■ ix
3.5 SUMMARY 55
3.6 EXERCISES 55
3.7 GLOSSARY 57
Chapter 4 ■ MCC Architecture Design, Key Techniques,
and Challenges 61
4.1 INTRODUCTION 62
4.2 CLOUD COMPUTING ARCHITECTURE 63
4.3 ARCHITECTURE OF MOBILE CLOUD
COMPUTING 64
4.3.1 Overview 64
4.3.2 Hybrid Cloud Computing Architecture 65
4.4 CRUCIAL MANAGEMENT STRATEGIES FOR
DISTRIBUTED CLOUDS 67
4.4.1 Hybrid Cloud Resource Manager 69
4.4.2 Manipulations of the Cloud Resource Manager 71
4.5 OPTIMIZATION MECHANISMS OF HYBRID CLOUD
COMPUTING 72
4.6 SECURITY CHALLENGES AND SOLUTIONS IN
MOBILE CLOUDS 73
4.6.1 Main Challenges in Mobile Clouds 73
4.6.2 Overview of Security Solutions 75
4.7 SUMMARY 76
4.8 EXERCISES 77
4.9 GLOSSARY 78
Part II Optimizations of Data Processing and Storage
in Mobile Clouds
Chapter 5 ■ Basic Optimizations: A Perspective of Cloud
Computing Performance 81
5.1 INTRODUCTION
82
x ■ Contents
5.2 CLOUD COMPUTING PERFORMANCE 83
5.2.1 Two Technical Dimensions 83
5.2.2 Basic Task Scheduling Method 84
5.2.2.1 Use Directed Acyclic Graph 86
5.2.2.2 Basic Cloud Performance
Modelization Using the DAG 87
5.2.3 Examples of Evaluation Modelizations 88
5.2.3.1 Mapping Costs 88
5.2.3.2 Calculations of Total Costs 89
5.2.3.3 Case Study: Calculate Total
Execution Time 90
5.3 GREEN CLOUD COMPUTING 92
5.3.1 Basic Concepts of Green Cloud Computing 93
5.3.2 Dimensions in Algorithms of Green Clouds 95
5.3.3 Creating an Algorithm for Green Clouds 97
5.3.3.1 Crucial Steps 97
5.3.3.2 Sample Energy-Aware Scheduling
Algorithm 98
5.4 FURTHER READING 102
5.5 SUMMARY 102
5.6 EXERCISES 103
5.7 GLOSSARY 105
Chapter 6 ■ Preemptable Algorithm Execution in Mobile
Cloud Systems 107
6.1 INTRODUCTION 108
6.2 PREEMPTABLE SCHEDULING IN IAAS 109
6.2.1 Basic Cloud Resource Allocation Mechanism 110
6.2.1.1 Fundamental Structure of Cloud
Resource Allocation Mechanism 110
6.2.1.2 Main Steps of Cloud Resource
Allocation Mechanism 111
Contents ■ xi
6.2.2 Messaging Methods: Pull-Push Modes 114
6.2.3 Concepts of the Resource Allocation Model in
Cloud Computing 116
6.2.3.1 Advance Reservation vs. Best-Effort
Tasks 116
6.2.3.2 Formulations of the Resource
Allocation Problems 118
6.2.3.3 Parameters/Variables of the
Execution Time 120
6.2.4 Summary 121
6.3 RESOURCE ALLOCATION ALGORITHMS IN CLOUD
COMPUTING 121
6.3.1 Round-Robin (RR) Algorithm 121
6.3.1.1 RR Algorithm Description 121
6.3.1.2 RR Algorithm Example 123
6.3.2 Cloud List Scheduling Algorithm 125
6.3.2.1 Cloud List Scheduling Algorithm
Description 125
6.3.2.2 Cloud List Scheduling Algorithm
Example 126
6.3.3 Min-Min Scheduling Algorithm 127
6.3.3.1 Min-Min Scheduling Algorithm
Description 127
6.3.3.2 Min-Min Scheduling Algorithm
Example 128
6.4 FURTHER READING 131
6.5 SUMMARY 132
6.6 EXERCISES 132
6.7 GLOSSARY 136
Chapter 7 ■ Big Data and Service Computing in Cloud
Computing 137
7.1 INTRODUCTION
138
xii ■ Contents
7.2 OVERVIEW OF BIG DATA 139
7.2.1 Concepts of Big Data 139
7.2.2 Big Data Processing 140
7.3 PHASE-RECONFIGURABLE SHUFFLE
OPTIMIZATION 141
7.3.1 Spilling and Network in Shuffle 141
7.3.1.1 Map Functions in Distributed System 143
7.3.1.2 Networks in Shuffle 144
7.3.1.3 Reduce Side 144
7.4 FURTHER READING 145
7.5 SUMMARY 146
7.6 EXERCISES 146
7.7 GLOSSARY 147
Part III Security Issues and Solutions in Mobile Cloud
Systems
Chapter 8 ■ Security and Privacy Issues and Threats in MCC 151
8.1 INTRODUCTION 152
8.1.1 Basic Concepts 153
8.1.2 Features of Security and Privacy Issues in
Mobile Clouds 154
8.2 MAIN SECURITY AND PRIVACY PROBLEMS 155
8.2.1 Data Over-Collection Problems 155
8.2.2 Data/Privacy Control Problems 157
8.2.3 Trust Management Problems 158
8.2.4 Multi-Tenancy Problems 159
8.2.5 Summary 160
8.3 THREAT TAXONOMY 160
8.3.1 Confidentiality, Integrity, and Availability 161
8.3.2 Massive Data Mining 162
8.3.3 Attack Interfaces 162
Contents ■ xiii
8.3.4 Auditability, Forensics, and Legal Issues 162
8.3.5 Summary 164
8.4 THREAT MODELS 164
8.4.1 Basic Concepts 164
8.4.2 Insider Threats 167
8.4.2.1 Customer Side 168
8.4.2.2 Service Provider Side 169
8.4.3 Outsider Threats 170
8.4.3.1 Attack Methods and Goals 170
8.4.3.2 Crucial Issues in Outsider Threats 171
8.5 FURTHER READING 173
8.6 SUMMARY 174
8.7 EXERCISES 174
8.8 GLOSSARY 175
Chapter 9 ■ Privacy Protection Techniques in Mobile Cloud
Computing 179
9.1 INTRODUCTION 180
9.2 CRUCIAL SECURITY DIMENSIONS 181
9.2.1 Infrastructure Security 181
9.2.1.1 Network Layer 181
9.2.1.2 Host Layer 184
9.2.1.3 Application Layer 186
9.2.2 Mobile Data Security and Storage 187
9.2.3 Mobile Identity and Access Management 189
9.2.4 Privacy Protection Concerns 190
9.2.4.1 Data Life Cycle 190
9.2.4.2 Concern Dimensions 191
9.3 SECURITY AND PRIVACY SOLUTIONS 193
9.3.1 Overview 193
9.3.2 Monitoring-Based Solutions 194
xiv ■ Contents
9.3.3 Access Control-Based Solutions 195
9.4 FURTHER READING 197
9.5 SUMMARY 198
9.6 EXERCISES 198
9.7 GLOSSARY 199
Part IV Integrating Service-Oriented Architecture with
Mobile Cloud Computing
Chapter 10 ■ Web Services in Cloud Computing 203
10.1 INTRODUCTION 204
10.2 OVERVIEW OF SERVICE-ORIENTED
ARCHITECTURE 205
10.2.1 Web Services 205
10.2.1.1 Basic Concepts 205
10.2.1.2 Web Services Architecture 205
10.2.2 Specifications of Web Services 207
10.2.2.1 Simple Object Access Protocol 207
10.2.2.2 Representational State Transfer 210
10.2.2.3 JavaScript Object Notation 212
10.2.2.4 WS-Coordination 212
10.2.3 Service-Oriented Architecture 213
10.2.3.1 Basic Concepts of SOA 213
10.2.3.2 Understanding Services 213
10.3 INTEGRATING SERVICE-ORIENTED
ARCHITECTURE WITH CLOUD COMPUTING 217
10.3.1 Integration Fundamentals 217
10.3.2 Web Services Business Process Execution
Language 219
10.3.3 Web Services Security and Specifications 219
10.3.3.1 Specifications 219
10.3.3.2 WS-Security Framework 220
10.4 SUMMARY 222
Contents ■ xv
10.5 EXERCISES 222
10.6 GLOSSARY 223
Part V Appendices
Appendix A ■ Sample of A Course Project 227
A.l PROJECT DESCRIPTION 227
A.2 PART I: HANDS-ON EXPERIENCE 227
A.2.1 Experimental Requirement 228
A.2.2 DAG and Execution Time Table 228
A.3 PART II: RESEARCH ESSAY 229
A.4 TUTORIAL: CREATE/LAUNCH VIRTUAL
MACHINE FOR PART I 231
Appendix B ■ Sample of Exam Sheet 241
B.l PART I. MULTIPLE CHOICE QUESTIONS 241
B.2 PART II. SHORT ANSWER QUESTION 245
B.3 ANSWERS FOR PART I 247
Appendix C ■ Simulator Tool Sample Codes 249
C.l PROGRAM 1: USER INTERFACE (UI.JAVA) 250
C.2 PROGRAM 2: TASK.JAVA 255
C.3 PROGRAM 3: TASKGRAPH.JAVA 257
References 265
Index
277
Computer Science Engineering
l|k
Mobile Cloud Computing: Models, Implementation, and Security provides a
comprehensive introduction to mobile cloud computing, including key concepts,
models, and relevant applications. The book focuses on novel and advanced
algorithms, as well as mobile app development.
The book begins with an overview of mobile cloud computing concepts, models,
and service deployments, as well as specific cloud service models. It continues with
the basic mechanisms and principles of mobile computing, as well as virtualization
techniques. The book also introduces mobile cloud computing architecture, design,
key techniques, and challenges.
The second part of the book covers optimizations of data processing and storage
in mobile clouds, including performance and green clouds. The crucial optimization
algorithm in mobile cloud computing is also explored, along with big data and service
computing.
Security issues in mobile cloud computing are covered in-depth, including a brief
introduction to security and privacy issues and threats, as well as privacy protection
techniques in mobile systems. The last part of the book features the integration of
service-oriented architecture with mobile cloud computing. It discusses web service
specifications related to implementations of mobile cloud computing.
The book not only presents critical concepts in mobile cloud systems, but also
drives readers to deeper research, through open discussion questions. Practical
case studies are also included. Suitable for graduate students and professionals,
this book provides a detailed and timely overview of mobile cloud computing for a
broad range of readers.
Meikang Qiu is an associate professor of computer science at Pace University, and
an adjunct professor at Columbia University. He is an IEEE/ACM Senior Member, as
well as Chair of the IEEE STC (Special Technical Community) on Smart Computing.
He is an associate editor of a dozen of journals including Transactions on
Computers and IEEE Transactions on Cloud Computing. He has published 360+
peer-reviewed joumal/conference papers and won 10+ Best Paper Awards.
Keke Gai is pursuing his PhD at Pace University. He has published over 70 peer-
reviewed journal or conference papers, and has been granted three IEEE Best Paper
Awards and two IEEE Best Student Paper Awards. His research interests include
cloud computing, cyber security, combinatorial optimization, business process
modeling, enterprise architecture, and Internet computing.
CRC Press
Taylor . Francis Group
an Informa business
www.crcpress.com
6000 Broken Sound Parkway, NW
Suite 300, Boca Raton, FL 33487
711 Third Avenue
New York, NY 10017
2 Park Square, Milton Park
Abingdon, Oxon 0X14 4RN, UK
K30352
ISBN : c!70-l-4c1fl7-t1b03-3
90000
9 781498 796033
www.crcpress.com
|
any_adam_object | 1 |
author | Qiu, Meikang Gai, Keke |
author_GND | (DE-588)1013594762 |
author_facet | Qiu, Meikang Gai, Keke |
author_role | aut aut |
author_sort | Qiu, Meikang |
author_variant | m q mq k g kg |
building | Verbundindex |
bvnumber | BV044927680 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 |
callnumber-search | QA76.585 |
callnumber-sort | QA 276.585 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)983226802 (DE-599)BVBBV044927680 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02124nam a2200457 c 4500</leader><controlfield tag="001">BV044927680</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230607 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">180503s2017 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017002243</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781498796033</subfield><subfield code="9">978-1-4987-9603-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)983226802</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044927680</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.585</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Qiu, Meikang</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1013594762</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile cloud computing</subfield><subfield code="b">models, implementation, and security</subfield><subfield code="c">Meikang Qiu, Pace University, New York City, New York, USA, Keke Gai, Pace University, New York City, New York, USA</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxxii, 288 pages</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 265-276) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gai, Keke</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030320821&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030320821&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030320821</subfield></datafield></record></collection> |
id | DE-604.BV044927680 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:14:29Z |
institution | BVB |
isbn | 9781498796033 |
language | English |
lccn | 017002243 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030320821 |
oclc_num | 983226802 |
open_access_boolean | |
owner | DE-703 |
owner_facet | DE-703 |
physical | xxxii, 288 pages 24 cm |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
spellingShingle | Qiu, Meikang Gai, Keke Mobile cloud computing models, implementation, and security Cloud computing Mobile computing Cloud Computing (DE-588)7623494-0 gnd Mobile Computing (DE-588)4694120-4 gnd |
subject_GND | (DE-588)7623494-0 (DE-588)4694120-4 |
title | Mobile cloud computing models, implementation, and security |
title_auth | Mobile cloud computing models, implementation, and security |
title_exact_search | Mobile cloud computing models, implementation, and security |
title_full | Mobile cloud computing models, implementation, and security Meikang Qiu, Pace University, New York City, New York, USA, Keke Gai, Pace University, New York City, New York, USA |
title_fullStr | Mobile cloud computing models, implementation, and security Meikang Qiu, Pace University, New York City, New York, USA, Keke Gai, Pace University, New York City, New York, USA |
title_full_unstemmed | Mobile cloud computing models, implementation, and security Meikang Qiu, Pace University, New York City, New York, USA, Keke Gai, Pace University, New York City, New York, USA |
title_short | Mobile cloud computing |
title_sort | mobile cloud computing models implementation and security |
title_sub | models, implementation, and security |
topic | Cloud computing Mobile computing Cloud Computing (DE-588)7623494-0 gnd Mobile Computing (DE-588)4694120-4 gnd |
topic_facet | Cloud computing Mobile computing Cloud Computing Mobile Computing |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030320821&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030320821&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT qiumeikang mobilecloudcomputingmodelsimplementationandsecurity AT gaikeke mobilecloudcomputingmodelsimplementationandsecurity |