Araştırma Makalesi
BibTex RIS Kaynak Göster

Cloud Interaction and Safety Features of Mobile Devices

Yıl 2016, Cilt: 1 Sayı: 1, 19 - 27, 01.05.2016
https://doi.org/10.30931/jetas.281378

Öz

In this paper, two current popular mobile operating system, still in relation to the concept
of cloud began to supplant the internet almost Word today, the differences, the concept of cloud
security mechanisms they use for themselves and are dealt with in this environment. One of
comparing mobile operation system is representing open source and the other for close source one.
The other issue discussed in this article is how the mobile environment interacts with the cloud than
the cloud communication with the computers.

Kaynakça

  • [1] Lenhart, Amanda, et al. "Social Media & Mobile Internet Use among Teens and Young Adults. Millennials." Pew internet & American life project (2010).
  • [2] We power the Microsoft Cloud, http://www.microsoft.com/en-us/server-cloud/cloud-os/global-datacenters.aspx, 20 Kasım 2016.
  • [3] Windows Phone, What Is Cloud? , http://www.windowsphone.com/en- us/how-to/wp8/basics/what-is-the-cloud , 01 Ekim 2016.
  • [4] Sağırolu, Şeref, ve Hülya Bulut. "Mobil ortamlarda bilgi ve haberleşme güvenliği üzerine bir inceleme." Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi 24.3 (2009).
  • [5] Samantha Morris (2011), “Cloud Types: Private, Public And Hybrid.”, Asigra.
  • [6] Ben-Ari (1982), “Summarizes the concurrent programming abstraction”, Prentice Hall International.
  • [7] Marsden (1986), Why are standards necessary?, “Uses BSC as an example to show the need for both standard protocols and a standard framework”, Communication network protocols 2nd Edition.
  • [8] Vangie Beal (2013), “Cloud computing (the cloud)”, Webopedia, http://www.webopedia.com/TERM/C/cloud_computing.html.
  • [9] Abdullah Kuzu (2011), “Bilgisayar Ağları ve İletişim”, Nobel Yayınları.
  • [10] Veugen, Thijs, et al. "A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations." IEEE Transactions on Information Forensics and Security 10.3 (2015): 445-457.
Yıl 2016, Cilt: 1 Sayı: 1, 19 - 27, 01.05.2016
https://doi.org/10.30931/jetas.281378

Öz

Kaynakça

  • [1] Lenhart, Amanda, et al. "Social Media & Mobile Internet Use among Teens and Young Adults. Millennials." Pew internet & American life project (2010).
  • [2] We power the Microsoft Cloud, http://www.microsoft.com/en-us/server-cloud/cloud-os/global-datacenters.aspx, 20 Kasım 2016.
  • [3] Windows Phone, What Is Cloud? , http://www.windowsphone.com/en- us/how-to/wp8/basics/what-is-the-cloud , 01 Ekim 2016.
  • [4] Sağırolu, Şeref, ve Hülya Bulut. "Mobil ortamlarda bilgi ve haberleşme güvenliği üzerine bir inceleme." Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi 24.3 (2009).
  • [5] Samantha Morris (2011), “Cloud Types: Private, Public And Hybrid.”, Asigra.
  • [6] Ben-Ari (1982), “Summarizes the concurrent programming abstraction”, Prentice Hall International.
  • [7] Marsden (1986), Why are standards necessary?, “Uses BSC as an example to show the need for both standard protocols and a standard framework”, Communication network protocols 2nd Edition.
  • [8] Vangie Beal (2013), “Cloud computing (the cloud)”, Webopedia, http://www.webopedia.com/TERM/C/cloud_computing.html.
  • [9] Abdullah Kuzu (2011), “Bilgisayar Ağları ve İletişim”, Nobel Yayınları.
  • [10] Veugen, Thijs, et al. "A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations." IEEE Transactions on Information Forensics and Security 10.3 (2015): 445-457.
Toplam 10 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Matematik, Mühendislik
Bölüm Research Article
Yazarlar

Mirsat Yeşiltepe Bu kişi benim

Yayımlanma Tarihi 1 Mayıs 2016
Yayımlandığı Sayı Yıl 2016 Cilt: 1 Sayı: 1

Kaynak Göster

APA Yeşiltepe, M. (2016). Cloud Interaction and Safety Features of Mobile Devices. Journal of Engineering Technology and Applied Sciences, 1(1), 19-27. https://doi.org/10.30931/jetas.281378
AMA Yeşiltepe M. Cloud Interaction and Safety Features of Mobile Devices. JETAS. Mayıs 2016;1(1):19-27. doi:10.30931/jetas.281378
Chicago Yeşiltepe, Mirsat. “Cloud Interaction and Safety Features of Mobile Devices”. Journal of Engineering Technology and Applied Sciences 1, sy. 1 (Mayıs 2016): 19-27. https://doi.org/10.30931/jetas.281378.
EndNote Yeşiltepe M (01 Mayıs 2016) Cloud Interaction and Safety Features of Mobile Devices. Journal of Engineering Technology and Applied Sciences 1 1 19–27.
IEEE M. Yeşiltepe, “Cloud Interaction and Safety Features of Mobile Devices”, JETAS, c. 1, sy. 1, ss. 19–27, 2016, doi: 10.30931/jetas.281378.
ISNAD Yeşiltepe, Mirsat. “Cloud Interaction and Safety Features of Mobile Devices”. Journal of Engineering Technology and Applied Sciences 1/1 (Mayıs 2016), 19-27. https://doi.org/10.30931/jetas.281378.
JAMA Yeşiltepe M. Cloud Interaction and Safety Features of Mobile Devices. JETAS. 2016;1:19–27.
MLA Yeşiltepe, Mirsat. “Cloud Interaction and Safety Features of Mobile Devices”. Journal of Engineering Technology and Applied Sciences, c. 1, sy. 1, 2016, ss. 19-27, doi:10.30931/jetas.281378.
Vancouver Yeşiltepe M. Cloud Interaction and Safety Features of Mobile Devices. JETAS. 2016;1(1):19-27.