Mobile cloud computing: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: doi-broken-date. | You can use this bot yourself. Report bugs here. | Suggested by AManWithNoPlan | Category:CS1_maint:_DOI_inactive_as_of_September_2020 | via #UCB_Category 81/949
Ow oddb
Tags: Reverted Visual edit Mobile edit Mobile web edit
Line 20:
* '''Trust, security, and privacy issues:''' Trust is an essential factor for the success of the burgeoning MCC paradigm. It is because the data along with code/component/application/complete VM is offloaded to the cloud for execution. Moreover, just like software and mobile application piracy, the MCC application development models are also affected by the piracy issue.<ref name="Khan 753–776">{{Cite journal|last1=Khan|first1=Atta ur Rehman|last2=Othman|first2=Mazliza|last3=Ali|first3=Mazhar|last4=Khan|first4=Abdul Nasir|last5=Madani|first5=Sajjad Ahmad|date=2013-12-01|title=Pirax: framework for application piracy control in mobile cloud environment|journal=The Journal of Supercomputing|language=en|volume=68|issue=2|pages=753–776|doi=10.1007/s11227-013-1061-1|s2cid=14880069|issn=0920-8542}}</ref> Pirax<ref name="Khan 753–776"/> is known to be the first specialized framework for controlling application piracy in MCC requirements
 
==MCC research groups andRAHJANHENDIEIBDKand activities==
Several academic and industrial research groups in MCC have been emerging since last few years. Some of the MCC research groups in academia with large number of researchers and publications include: