Foreword ..................................................... xiii
Preface ........................................................ xv
Chapter 1
(SET) Smart Energy Management and Throughput Maximization:
A New Routing Protocol for WSNs ................................. 1
Hassan El Alami, INPT - Rabat, Morocco
Abdellah Najid, INPT - Rabat, Morocco
Chapter 2
A Cloud Intrusion Detection Based on Classification of
Activities and Mobile Agent .................................... 29
Nadya El Moussaid, Ibn Zohr University, Morocco
Ahmed Toumanari, Ibn Zohr University, Morocco
Chapter 3
Considering Middle Circles in Mobile Cloud Computing: Ethics
and Risk Governance ............................................ 43
Mohammad Ali Shalan, University of Jordan, Jordan
Chapter 4
Managing Risk in Cloud Computing ............................... 73
Lawan Ahmed Mohammed, University ofHafr Albatin, Saudi Arabia
Chapter 5
On the Role of Game Theory in Modelling Incentives and
Interactions in Mobile Distributed Systems ..................... 92
Mohammed Onimisi Yahaya, University ofHafr Albatin, Saudi
Arabia
Chapter 6
Security and Privacy Issues, Solutions, and Tools for MCC ..... 121
Darshan M. Tank, Gujarat Technological University, India
Chapter 7
Security Management in Mobile Cloud Computing: Security and
Privacy Issues and Solutions in Mobile Cloud Computing ........ 148
Basudeo Singh, R.V. College of Engineering, India
Jasmine K.S., R.V. College of Engineering, India
Chapter 8
Security Model for Mobile Cloud Database as a Service
(DBaaS) ....................................................... 169
Kashif Munir, University of Hafr Al-Batin, Saudi Arabia
Related References ............................................ 181
Compilation of References ..................................... 223
About the Contributors ........................................ 243
Index ......................................................... 246
|