{"id":"https://openalex.org/W2009511419","doi":"https://doi.org/10.1109/trustcom.2013.166","title":"Quantitative Risk Analysis for Mobile Cloud Computing: A Preliminary Approach and a Health Application Case Study","display_name":"Quantitative Risk Analysis for Mobile Cloud Computing: A Preliminary Approach and a Health Application Case Study","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2009511419","doi":"https://doi.org/10.1109/trustcom.2013.166","mag":"2009511419"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067908357","display_name":"Javeria Samad","orcid":null},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"funder","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Javeria Samad","raw_affiliation_strings":["Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, Vic., Australia"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, Vic., Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049314231","display_name":"Seng W. Loke","orcid":"https://orcid.org/0000-0002-5339-9305"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"funder","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Seng W. Loke","raw_affiliation_strings":["Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, Vic., Australia"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, Vic., Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058025508","display_name":"Karl Reed","orcid":null},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"funder","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Karl Reed","raw_affiliation_strings":["Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, Vic., Australia"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, Vic., Australia","institution_ids":["https://openalex.org/I196829312"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.161,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":14,"citation_normalized_percentile":{"value":0.697772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"1378","last_page":"1385"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9947,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-cloud-computing","display_name":"Mobile Cloud Computing","score":0.5936307}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.9137887},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75506973},{"id":"https://openalex.org/C2779191767","wikidata":"https://www.wikidata.org/wiki/Q6887075","display_name":"Mobile cloud computing","level":3,"score":0.5936307},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.49544346},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.47562316},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.46258307},{"id":"https://openalex.org/C120115606","wikidata":"https://www.wikidata.org/wiki/Q5135723","display_name":"Cloud testing","level":4,"score":0.41932863},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37953806},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.34824502},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.105214804},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08524227},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06364775},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","score":0.57,"display_name":"Responsible consumption and production"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":38,"referenced_works":["https://openalex.org/W1474786465","https://openalex.org/W1584708179","https://openalex.org/W1598210982","https://openalex.org/W1607437805","https://openalex.org/W1821409700","https://openalex.org/W1972676479","https://openalex.org/W1981782231","https://openalex.org/W1991650436","https://openalex.org/W1995586632","https://openalex.org/W2003265014","https://openalex.org/W2012423440","https://openalex.org/W2013439042","https://openalex.org/W2022667228","https://openalex.org/W2025431899","https://openalex.org/W2073017934","https://openalex.org/W2073777289","https://openalex.org/W2075733227","https://openalex.org/W2085094300","https://openalex.org/W2101788345","https://openalex.org/W2109026747","https://openalex.org/W2115112711","https://openalex.org/W2116436884","https://openalex.org/W2116836841","https://openalex.org/W2118488578","https://openalex.org/W2130741111","https://openalex.org/W2131629857","https://openalex.org/W2135099885","https://openalex.org/W2150934664","https://openalex.org/W2156790209","https://openalex.org/W2167293777","https://openalex.org/W2209768828","https://openalex.org/W2512503597","https://openalex.org/W2592652383","https://openalex.org/W3143448731","https://openalex.org/W4248315516","https://openalex.org/W4285719527","https://openalex.org/W4298235322","https://openalex.org/W74922527"],"related_works":["https://openalex.org/W4251064165","https://openalex.org/W4238737051","https://openalex.org/W3150868077","https://openalex.org/W2242761268","https://openalex.org/W2189618501","https://openalex.org/W2048100608","https://openalex.org/W2034905385","https://openalex.org/W2000575702","https://openalex.org/W1994384501","https://openalex.org/W191275436"],"abstract_inverted_index":{"Mobile":[0],"cloud":[1,14,79,90,102],"computing":[2,103],"is":[3,64],"presented":[4],"as":[5,36,53,55,104],"the":[6,11,40,44],"next":[7],"logical":[8],"step":[9,67],"in":[10,24,68],"adoption":[12],"of":[13,21,47],"based":[15,91],"systems.":[16],"However,":[17],"there":[18],"are":[19,33],"number":[20],"issues":[22,32],"inherent":[23],"it":[25],"that":[26],"may":[27],"limit":[28],"its":[29],"uptake.":[30],"These":[31],"best":[34],"understood":[35],"\"risks\"":[37],"which":[38,98],"span":[39],"whole":[41],"structure":[42],"and":[43,50,59,94],"life":[45],"cycle":[46],"mobile":[48,78,89],"clouds":[49],"could":[51],"be":[52],"varied":[54],"security,":[56],"operations,":[57],"performance,":[58],"end-users":[60],"behaviours.":[61],"This":[62],"paper":[63],"a":[65,70,76,88,105],"first":[66],"developing":[69],"quantitative":[71],"risk":[72],"model":[73,85],"suitable":[74],"for":[75,101],"dynamic":[77],"environment.":[80],"We":[81],"also":[82],"use":[83],"this":[84],"to":[86],"analyse":[87],"health":[92],"application":[93],"report":[95],"our":[96],"findings,":[97],"have":[99],"implications":[100],"whole.":[106]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2009511419","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2025-02-16T18:01:51.017649","created_date":"2016-06-24"}