Palanisamy et al., 2023 - Google Patents
Users' attitude on perceived security of mobile cloud computing: empirical evidence from SME users in ChinaPalanisamy et al., 2023
- Document ID
- 480409921154662662
- Author
- Palanisamy R
- Shi Y
- Publication year
- Publication venue
- Information & Computer Security
External Links
Snippet
Purpose The purpose of this paper is to rank the users' attitude on major components of mobile cloud computing (MCC) security and investigate the degree of impact of these components on MCC security as a whole. Design/methodology/approach Hypotheses were …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
- G06F17/30598—Clustering or classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12381876B2 (en) | Anomaly-based mitigation of access request risk | |
US11888870B2 (en) | Multitenant sharing anomaly cyberattack campaign detection | |
US11783062B2 (en) | Risk-based access to computing environment secrets | |
US20230308460A1 (en) | Behavior detection and verification | |
Weichbroth et al. | Mobile security: Threats and best practices | |
US11310257B2 (en) | Anomaly scoring using collaborative filtering | |
US8776180B2 (en) | Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms | |
US20240054227A1 (en) | Identification of a resource attack path by connecting code, configuration, and telemetry | |
US20220247776A1 (en) | Analyzing and addressing security threats in network resources | |
US11973796B2 (en) | Dangling domain detection and access mitigation | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
US10938849B2 (en) | Auditing databases for security vulnerabilities | |
Haimes et al. | Assessing systemic risk to cloud‐computing technology as complex interconnected systems of systems | |
Park et al. | An empirical study on the influential factors affecting continuous usage of mobile cloud service | |
Palanisamy et al. | Users’ attitude on perceived security of enterprise systems mobility: an empirical study | |
Palanisamy et al. | Users’ attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China | |
Bertino et al. | Web services threats, vulnerabilities, and countermeasures | |
Aldea et al. | Software vulnerabilities integrated management system | |
Rahman et al. | Towards a taxonomy of challenges in security control implementation | |
Di et al. | Influencing user’s behavior concerning android privacy policy: an overview | |
Pönkänen | Zero trust guidelines for enterprises | |
Onwuzurike | Measuring and Mitigating Security and Privacy Issues on Android Applications | |
Zhang et al. | SELinux-based operating system security research | |
Fay | A deep dive into Avivore | |
Elsayed | Advancing Security Services for Cloud Applications |