Home Page Icon
Home Page
Table of Contents for
Cover image
Close
Cover image
by Huijun Wu, Dijiang Huang
Mobile Cloud Computing
Cover image
Title page
Table of Contents
Copyright
Dedication
About the Authors
Dijiang Huang
Huijun Wu
Foreword
Preface
A Little History
Audience
Organization and Approach
Bonus Materials and Online Resources
Acknowledgment
Bibliography
Part 1: Mobile Cloud Computing Foundation
Introduction
Chapter 1: Mobile Cloud Computing Taxonomy
Abstract
1.1. Overview of Cloud Computing
1.2. Mobile Cloud Solutions
Bibliography
Chapter 2: Virtualization
Abstract
2.1. The Concept of Virtualization
2.2. Classifications of Computer/Machine Virtualization
2.3. Lightweight Virtualization: Containers
2.4. Mobile Device Virtualization
2.5. Network Virtualization
2.6. Storage Virtualization
Bibliography
Chapter 3: Mobile Cloud Service Models
Abstract
3.1. Review Cloud Service Models
3.2. Current Mobile Cloud Service Models
3.3. Mobile Cloud Service Models and Examples
3.4. IoT and Microservices
Bibliography
Part 2: Mobile Cloud Computing
Introduction
Bibliography
Chapter 4: Mobile Cloud Computing Service Framework
Abstract
4.1. Transitions from Internet Clouds to User-centric Mobile Clouds
4.2. Overview of POEM
4.3. Design of Mobile Cloud Service Framework
4.4. Performance Considerations of Mobile Cloud Service Platform
Bibliography
Chapter 5: Mobile Cloud Offloading Models
Abstract
5.1. Mobile Cloud Offloading Setup
5.2. One-to-One Offloading Case
5.3. Many-to-Many Offloading Case
5.4. Evolving Mobile Cloud Computing
Bibliography
Chapter 6: Edge Clouds – Pushing the Boundary of Mobile Clouds
Abstract
6.1. Edge Cloud
6.2. Microservices for Mobile Cloud Computing
6.3. Microservices Patterns for IoT
Bibliography
Part 3: Mobile Cloud Computing Security
Introduction
Bibliography
Chapter 7: Mobile Cloud Security: Attribute-Based Access Control
Abstract
7.1. Attribute-Based Access Control
7.2. Using Information Centric Networking and ABAC to Support Mobile Cloud Computing
7.3. Ontology-Based Attribute Management
7.4. Secure Computation Offloading
Bibliography
Chapter 8: Mobile Cloud Security: Virtualization and Isolation on Mobiles
Abstract
8.1. Virtualization and Isolation Approaches on Mobiles
8.2. System Design and Architecture
8.3. Communication with Remote OpenDayLight Controller
8.4. What Is the Next Step?
Bibliography
Appendix A: Mobile Cloud Resource Management
A.1. Overview of Cloud Resource Management
A.2. Mobile Cloud Resource Management
Bibliography
Appendix B: Mobile Cloud Programming and Application Platform
B.1. Run OSGi Frameworks
B.2. Running Surrogate Server
B.3. Service Binding
B.4. Putting All Together
Bibliography
Appendix C: Cryptographic Constructions
C.1. Cryptographic Constructions for ICN Naming Scheme
C.2. Partitioning CP-ABE
Bibliography
Appendix D: Bring Your Own Device (BYOD) Implementation and Evaluation
D.1. Hardware Requirements
D.2. Host and Guest Setup
D.3. Booting up Arndale Board
D.4. Open vSwitch with KVM
Bibliography
Bibliography
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset