Research Article
BibTex RIS Cite

Cloud Interaction and Safety Features of Mobile Devices

Year 2016, Volume: 1 Issue: 1, 19 - 27, 01.05.2016
https://doi.org/10.30931/jetas.281378

Abstract

In this paper, two current popular mobile operating system, still in relation to the concept
of cloud began to supplant the internet almost Word today, the differences, the concept of cloud
security mechanisms they use for themselves and are dealt with in this environment. One of
comparing mobile operation system is representing open source and the other for close source one.
The other issue discussed in this article is how the mobile environment interacts with the cloud than
the cloud communication with the computers.

References

  • [1] Lenhart, Amanda, et al. "Social Media & Mobile Internet Use among Teens and Young Adults. Millennials." Pew internet & American life project (2010).
  • [2] We power the Microsoft Cloud, http://www.microsoft.com/en-us/server-cloud/cloud-os/global-datacenters.aspx, 20 Kasım 2016.
  • [3] Windows Phone, What Is Cloud? , http://www.windowsphone.com/en- us/how-to/wp8/basics/what-is-the-cloud , 01 Ekim 2016.
  • [4] Sağırolu, Şeref, ve Hülya Bulut. "Mobil ortamlarda bilgi ve haberleşme güvenliği üzerine bir inceleme." Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi 24.3 (2009).
  • [5] Samantha Morris (2011), “Cloud Types: Private, Public And Hybrid.”, Asigra.
  • [6] Ben-Ari (1982), “Summarizes the concurrent programming abstraction”, Prentice Hall International.
  • [7] Marsden (1986), Why are standards necessary?, “Uses BSC as an example to show the need for both standard protocols and a standard framework”, Communication network protocols 2nd Edition.
  • [8] Vangie Beal (2013), “Cloud computing (the cloud)”, Webopedia, http://www.webopedia.com/TERM/C/cloud_computing.html.
  • [9] Abdullah Kuzu (2011), “Bilgisayar Ağları ve İletişim”, Nobel Yayınları.
  • [10] Veugen, Thijs, et al. "A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations." IEEE Transactions on Information Forensics and Security 10.3 (2015): 445-457.
Year 2016, Volume: 1 Issue: 1, 19 - 27, 01.05.2016
https://doi.org/10.30931/jetas.281378

Abstract

References

  • [1] Lenhart, Amanda, et al. "Social Media & Mobile Internet Use among Teens and Young Adults. Millennials." Pew internet & American life project (2010).
  • [2] We power the Microsoft Cloud, http://www.microsoft.com/en-us/server-cloud/cloud-os/global-datacenters.aspx, 20 Kasım 2016.
  • [3] Windows Phone, What Is Cloud? , http://www.windowsphone.com/en- us/how-to/wp8/basics/what-is-the-cloud , 01 Ekim 2016.
  • [4] Sağırolu, Şeref, ve Hülya Bulut. "Mobil ortamlarda bilgi ve haberleşme güvenliği üzerine bir inceleme." Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi 24.3 (2009).
  • [5] Samantha Morris (2011), “Cloud Types: Private, Public And Hybrid.”, Asigra.
  • [6] Ben-Ari (1982), “Summarizes the concurrent programming abstraction”, Prentice Hall International.
  • [7] Marsden (1986), Why are standards necessary?, “Uses BSC as an example to show the need for both standard protocols and a standard framework”, Communication network protocols 2nd Edition.
  • [8] Vangie Beal (2013), “Cloud computing (the cloud)”, Webopedia, http://www.webopedia.com/TERM/C/cloud_computing.html.
  • [9] Abdullah Kuzu (2011), “Bilgisayar Ağları ve İletişim”, Nobel Yayınları.
  • [10] Veugen, Thijs, et al. "A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations." IEEE Transactions on Information Forensics and Security 10.3 (2015): 445-457.
There are 10 citations in total.

Details

Primary Language English
Subjects Mathematical Sciences, Engineering
Journal Section Research Article
Authors

Mirsat Yeşiltepe This is me

Publication Date May 1, 2016
Published in Issue Year 2016 Volume: 1 Issue: 1

Cite

APA Yeşiltepe, M. (2016). Cloud Interaction and Safety Features of Mobile Devices. Journal of Engineering Technology and Applied Sciences, 1(1), 19-27. https://doi.org/10.30931/jetas.281378
AMA Yeşiltepe M. Cloud Interaction and Safety Features of Mobile Devices. JETAS. May 2016;1(1):19-27. doi:10.30931/jetas.281378
Chicago Yeşiltepe, Mirsat. “Cloud Interaction and Safety Features of Mobile Devices”. Journal of Engineering Technology and Applied Sciences 1, no. 1 (May 2016): 19-27. https://doi.org/10.30931/jetas.281378.
EndNote Yeşiltepe M (May 1, 2016) Cloud Interaction and Safety Features of Mobile Devices. Journal of Engineering Technology and Applied Sciences 1 1 19–27.
IEEE M. Yeşiltepe, “Cloud Interaction and Safety Features of Mobile Devices”, JETAS, vol. 1, no. 1, pp. 19–27, 2016, doi: 10.30931/jetas.281378.
ISNAD Yeşiltepe, Mirsat. “Cloud Interaction and Safety Features of Mobile Devices”. Journal of Engineering Technology and Applied Sciences 1/1 (May 2016), 19-27. https://doi.org/10.30931/jetas.281378.
JAMA Yeşiltepe M. Cloud Interaction and Safety Features of Mobile Devices. JETAS. 2016;1:19–27.
MLA Yeşiltepe, Mirsat. “Cloud Interaction and Safety Features of Mobile Devices”. Journal of Engineering Technology and Applied Sciences, vol. 1, no. 1, 2016, pp. 19-27, doi:10.30931/jetas.281378.
Vancouver Yeşiltepe M. Cloud Interaction and Safety Features of Mobile Devices. JETAS. 2016;1(1):19-27.