Identificador persistente para citar o vincular este elemento:
http://hdl.handle.net/10553/40198
Campo DC | Valor | idioma |
---|---|---|
dc.contributor.author | Sendra, S. | en_US |
dc.contributor.author | Lacuesta, R. | en_US |
dc.contributor.author | Lloret, J. | en_US |
dc.contributor.author | Macías López, Elsa María | en_US |
dc.date.accessioned | 2018-06-07T13:18:13Z | - |
dc.date.available | 2018-06-07T13:18:13Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.issn | 1607-9264 | en_US |
dc.identifier.uri | http://hdl.handle.net/10553/40198 | - |
dc.description.abstract | Spontaneous ad hoc cloud computing networks let us perform complex tasks in a distributed manner by sharing computing resources. This kind of infrastructure is based on mobile devices with limited processing and storage capacity. Nodes with more processing capacity and energy in a spontaneous network store data or perform computing tasks in order to increase the whole computing and storage capacity. However, these networks can also present some problems of security and data vulnerability. In this paper, we present a secure spontaneous mobile ad hoc cloud computing network to make estimations using several information sources. The application is able to create users and manage encryption methods to protect the data sent through the network. The proposal has been simulated in several scenarios. The results show that the network performance depends mainly on the network size and nodes mobility. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | Journal of Internet Technology | en_US |
dc.source | Journal of Internet Technology [ISSN 1607-9264], v. 18 (7), p. 1485-1498 | en_US |
dc.subject | 3325 Tecnología de las telecomunicaciones | en_US |
dc.subject.other | Mobile Cloud Computing | en_US |
dc.subject.other | Secure Protocol | en_US |
dc.subject.other | Spontaneous Networks | en_US |
dc.title | A secure spontaneous mobile ad hoc cloud computing network | en_US |
dc.type | info:eu-repo/semantics/Article | es |
dc.type | Article | es |
dc.identifier.doi | 10.6138/JIT.2017.18.7.20141221 | |
dc.identifier.scopus | 85041839929 | |
dc.identifier.isi | 000423459000002 | - |
dc.contributor.authorscopusid | 35189596800 | |
dc.contributor.authorscopusid | 35092517700 | |
dc.contributor.authorscopusid | 23389476400 | |
dc.contributor.authorscopusid | 24825216400 | |
dc.description.lastpage | 1498 | - |
dc.identifier.issue | 7 | - |
dc.description.firstpage | 1485 | - |
dc.relation.volume | 18 | - |
dc.investigacion | Ingeniería y Arquitectura | en_US |
dc.type2 | Artículo | en_US |
dc.contributor.daisngid | 699951 | |
dc.contributor.daisngid | 1182340 | |
dc.contributor.daisngid | 59484 | |
dc.contributor.daisngid | 9973514 | |
dc.contributor.wosstandard | WOS:Sendra, S | |
dc.contributor.wosstandard | WOS:Lacuesta, R | |
dc.contributor.wosstandard | WOS:Lloret, J | |
dc.contributor.wosstandard | WOS:Macias-Lopez, E | |
dc.date.coverdate | Enero 2017 | |
dc.identifier.ulpgc | Sí | es |
dc.description.sjr | 0,329 | |
dc.description.jcr | 1,301 | |
dc.description.sjrq | Q2 | |
dc.description.jcrq | Q3 | |
dc.description.scie | SCIE | |
item.grantfulltext | none | - |
item.fulltext | Sin texto completo | - |
crisitem.author.dept | GIR IUCES: Arquitectura y Concurrencia | - |
crisitem.author.dept | IU de Cibernética, Empresa y Sociedad (IUCES) | - |
crisitem.author.dept | Departamento de Ingeniería Telemática | - |
crisitem.author.orcid | 0000-0002-9085-8398 | - |
crisitem.author.parentorg | IU de Cibernética, Empresa y Sociedad (IUCES) | - |
crisitem.author.fullName | Macías López, Elsa María | - |
Colección: | Artículos |
Citas SCOPUSTM
1
actualizado el 17-nov-2024
Citas de WEB OF SCIENCETM
Citations
1
actualizado el 17-nov-2024
Visitas
100
actualizado el 29-jun-2024
Google ScholarTM
Verifica
Altmetric
Comparte
Exporta metadatos
Los elementos en ULPGC accedaCRIS están protegidos por derechos de autor con todos los derechos reservados, a menos que se indique lo contrario.