2012 IV International Congress on Ultra Modern Telecommunications and Control Systems 2012
DOI: 10.1109/icumt.2012.6459717
|View full text |Cite
|
Sign up to set email alerts
|

The readiness of mobile operating systems for cloud computing services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Meanwhile, Google Device Application private policy states the facility and flexibility for the users to remotely lock or clear the information and protect them with a stolen if they lost their mobile devices. In addition, some counter measures cloud access protection and established device identity with high protection to be adopted for better security of different smart phones and the clouds [17], [18].…”
Section: ) Security and Concernsmentioning
confidence: 99%
“…Meanwhile, Google Device Application private policy states the facility and flexibility for the users to remotely lock or clear the information and protect them with a stolen if they lost their mobile devices. In addition, some counter measures cloud access protection and established device identity with high protection to be adopted for better security of different smart phones and the clouds [17], [18].…”
Section: ) Security and Concernsmentioning
confidence: 99%