Sixth IEEE Workshop on Mobile Computing Systems and Applications
DOI: 10.1109/mcsa.2004.2
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Secure Cyber Foraging Infrastructure for Resource-Constrained Devices

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
93
0

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(93 citation statements)
references
References 14 publications
0
93
0
Order By: Relevance
“…As surrogates for remote execution, Goyal et al [14] propose the usage of virtual machine technology. Because the deployment of virtual machines in a cloud can lead to high WAN latencies, Su et al present Slingshot [15], where the VMs are co-located with the wireless access point.…”
Section: Related Workmentioning
confidence: 99%
“…As surrogates for remote execution, Goyal et al [14] propose the usage of virtual machine technology. Because the deployment of virtual machines in a cloud can lead to high WAN latencies, Su et al present Slingshot [15], where the VMs are co-located with the wireless access point.…”
Section: Related Workmentioning
confidence: 99%
“…As surrogates for remote execution, Goyal et al [21] propose the usage of virtual machine technology. Because the deployment of virtual machines in a cloud can lead to high WAN latencies, Su et al present Slingshot [22], where the VMs are co-located with the wireless access point.…”
Section: Related Workmentioning
confidence: 99%
“…Goyal et al [6] propose the use of virtualization on the infrastructure for remote execution. Here a client can request a virtual machine (VM) with specific resource guarantees to offload services to.…”
Section: Related Workmentioning
confidence: 99%