Erratum to: Information Technology Convergence

  • James J. (Jong Hyuk) Park
  • Leonard Barolli
  • Fatos Xhafa
  • Hwa Young Jeong
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 253)



This study was financially supported by Seoul National University of Science & Technology.


  1. 1.
    Dinh HT, Lee C, Niyato D, Wang P (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, Oct 2011Google Scholar
  2. 2.
    Kang DH, Han JH, Lee YK, Cho YS, Han SW, Kim JN, Cho HS (2010) Smartphone threats and security technology. Telectronics Telecommun Trends 25(3):72–80Google Scholar
  3. 3.
    Kim K, Kang DH (2009) Smartphone security technology in an open mobile environment. J KIISC 19(5):21–28Google Scholar
  4. 4.
    Berger S, Cáceres R, Goldman KA, Perez R, Sailer R, van Doorn L (2006) vTPM: virtualizing the trusted platform module. In: Proceedings of the 15th conference on USENIX security symposium, vol 15. USENIX Association, USAGoogle Scholar
  5. 5.
    Huang D, Zhou Z, Xu L, Xing T, Zhong Y (2011) Secure data processing framework for mobile cloud computing. IEEE INFOCOM 2011 workshop on cloud computingGoogle Scholar
  6. 6.
    Hada PS, Singh R, Manmohan M (2011) Security agents: a mobile agent based trust model for cloud computing. Int J Comput Appl 36(12):12–15Google Scholar
  7. 7.
    TCG (Trusted Computing Group),
  8. 8.
    Achemlal M, Gharout S, Gaber C (2011) Trusted platform module as an enabler for security in cloud computing. Proceedings of the conference on network and information systems security (SAR-SSI), 2011, IEEE, May 2011Google Scholar
  9. 9.
    Rocha F, Abreu S, Correia M (2011) The final frontier: confidentiality and privacy in the cloud. Computer 44(9):44–50Google Scholar
  10. 10.
    Kumar K (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43(4):51–56Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • James J. (Jong Hyuk) Park
    • 1
  • Leonard Barolli
    • 2
  • Fatos Xhafa
    • 3
  • Hwa Young Jeong
    • 4
  1. 1. Department of Computer Science and EngineeringSeoul National University of Science and Technology (SeoulTech)Seoul Republic of South Korea
  2. 2.Faculty of Information Engineering, Department of Information and Communication EngineeringFukuoka Institute of TechnologyFukuokaJapan
  3. 3.Departament de Llenguatges i Sistemes InformàticsUniversitat Politècnica De CatalunyaBarcelonaSpain
  4. 4.Humanitas CollegeKyung Hee UniversitySeoulRepublic of South Korea

Personalised recommendations