System Analysis and Design for Headspace's New Access Project
VerifiedAdded on 2023/06/04
|11
|2781
|87
AI Summary
This report provides a system analysis and design for Headspace's New Access project, including non-functional requirements of FURPS, cloud solutions, and recommended SDLC approach. The project aims to provide a distinct information system for young individuals suffering from mental illness, making it easier for them to communicate with health experts and doctors. The report recommends a predictive SDLC approach for the project.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SYSTEM ANALYSIS AND DESIGN
System Analysis and Design
Name of the Student
Name of the University
Author’s Note:
System Analysis and Design
Name of the Student
Name of the University
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SYSTEM ANALYSIS AND DESIGN
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
1. Non Functional Requirements............................................................................................3
1.1 Functionality................................................................................................................3
1.2 Usability.......................................................................................................................4
1.3 Reliability.....................................................................................................................4
1.4 Performance.................................................................................................................4
1.5 Security........................................................................................................................5
2. Cloud Solutions: Use of Several Types of Clouds.............................................................5
2.1 Strengths of Hybrid Cloud...........................................................................................6
2.2 Weaknesses of Hybrid Cloud.......................................................................................6
3. SDLC Approach.................................................................................................................6
3.1 Predictive SDLC Approach..........................................................................................7
3.2 Adaptive SDLC Approach...........................................................................................8
3.3 Recommended SDLC Approach..................................................................................8
Conclusion..................................................................................................................................9
References................................................................................................................................10
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
1. Non Functional Requirements............................................................................................3
1.1 Functionality................................................................................................................3
1.2 Usability.......................................................................................................................4
1.3 Reliability.....................................................................................................................4
1.4 Performance.................................................................................................................4
1.5 Security........................................................................................................................5
2. Cloud Solutions: Use of Several Types of Clouds.............................................................5
2.1 Strengths of Hybrid Cloud...........................................................................................6
2.2 Weaknesses of Hybrid Cloud.......................................................................................6
3. SDLC Approach.................................................................................................................6
3.1 Predictive SDLC Approach..........................................................................................7
3.2 Adaptive SDLC Approach...........................................................................................8
3.3 Recommended SDLC Approach..................................................................................8
Conclusion..................................................................................................................................9
References................................................................................................................................10
SYSTEM ANALYSIS AND DESIGN
Introduction
Headspace is a popular health organization in New South Wales that treat people with
mental illness. This is the type of information system, which can eventually store the various
details about young individuals, between the age group of 18 and 25 (Botta et al., 2016). All
of these patients are continuously asked regarding the mental issues they are facing. Thus,
they are highly disturbed with this type of continuous interaction with the health experts,
doctors and nurses. The project of New Access would be providing a distinct information
system, which can store the stories when they are narrated for the first time. The patients as
well as the various doctors, health experts and nurses will be highly benefitted from this type
of information system (Herbst, Kounev & Reussner, 2013). The treatment will be extremely
easier for all the health experts and even the data is updated properly. This report will be
describing the project of New Access and their non functional requirements of FURPS.
Moreover, a proper cloud based solution will also be provided here and the most suitable
SDLC approach will be recommended in the report.
Discussion
1. Non Functional Requirements
The various respective non functional requirements are responsible for helping to
accurately and perfectly identify all types of important and noteworthy qualities in an
information system (Hashizume et al., 2013). One of these non functional requirements is
FURPS or functionality, usability, reliability, performance and security. System operation is
judged by these requirements. The details for New Access project are provided below:
1.1 Functionality
It is the major non functional requirement in New Access project of Headspace
organization. This particular project would provide the most updated and up graded
Introduction
Headspace is a popular health organization in New South Wales that treat people with
mental illness. This is the type of information system, which can eventually store the various
details about young individuals, between the age group of 18 and 25 (Botta et al., 2016). All
of these patients are continuously asked regarding the mental issues they are facing. Thus,
they are highly disturbed with this type of continuous interaction with the health experts,
doctors and nurses. The project of New Access would be providing a distinct information
system, which can store the stories when they are narrated for the first time. The patients as
well as the various doctors, health experts and nurses will be highly benefitted from this type
of information system (Herbst, Kounev & Reussner, 2013). The treatment will be extremely
easier for all the health experts and even the data is updated properly. This report will be
describing the project of New Access and their non functional requirements of FURPS.
Moreover, a proper cloud based solution will also be provided here and the most suitable
SDLC approach will be recommended in the report.
Discussion
1. Non Functional Requirements
The various respective non functional requirements are responsible for helping to
accurately and perfectly identify all types of important and noteworthy qualities in an
information system (Hashizume et al., 2013). One of these non functional requirements is
FURPS or functionality, usability, reliability, performance and security. System operation is
judged by these requirements. The details for New Access project are provided below:
1.1 Functionality
It is the major non functional requirement in New Access project of Headspace
organization. This particular project would provide the most updated and up graded
SYSTEM ANALYSIS AND DESIGN
information regarding the mental health of the young patients. This system would stop them
from discussing their issues repeatedly to the doctors. Furthermore, data accessibility and up
gradation is much more easier with the proper implementation of New Access in Headspace.
Adaptability is the significant feature in New Access system.
1.2 Usability
It is another non functional requirement that depicts about the overall usability of the
New Access project. This effectiveness and efficiency of the project is properly maintained
with this (Botta et al., 2014). The proper uses of the project for the betterment of Headspace
organization are the major features of this usability. The ability of learning is also enhanced
by this. A completely user friendly infrastructure and interface is yet another significant
usability feature.
1.3 Reliability
This reliability is checked in New Access project in the organization of Headspace
and it is a major non functional requirement. Only accurate and reliable data are updated
within the system and also the health professionals solve the other issues of the patients with
much security. Data management is also done from reliable sources in this system.
1.4 Performance
The overall performance of the New Access project in the Headspace organization is
being checked after confirming that the data is genuine here. This type of data accuracy hence
provides good performance (Gupta, Seetharaman & Raj, 2013). Providing emergency
services is another measure for performance in New Access. The total response time is much
lesser here.
information regarding the mental health of the young patients. This system would stop them
from discussing their issues repeatedly to the doctors. Furthermore, data accessibility and up
gradation is much more easier with the proper implementation of New Access in Headspace.
Adaptability is the significant feature in New Access system.
1.2 Usability
It is another non functional requirement that depicts about the overall usability of the
New Access project. This effectiveness and efficiency of the project is properly maintained
with this (Botta et al., 2014). The proper uses of the project for the betterment of Headspace
organization are the major features of this usability. The ability of learning is also enhanced
by this. A completely user friendly infrastructure and interface is yet another significant
usability feature.
1.3 Reliability
This reliability is checked in New Access project in the organization of Headspace
and it is a major non functional requirement. Only accurate and reliable data are updated
within the system and also the health professionals solve the other issues of the patients with
much security. Data management is also done from reliable sources in this system.
1.4 Performance
The overall performance of the New Access project in the Headspace organization is
being checked after confirming that the data is genuine here. This type of data accuracy hence
provides good performance (Gupta, Seetharaman & Raj, 2013). Providing emergency
services is another measure for performance in New Access. The total response time is much
lesser here.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SYSTEM ANALYSIS AND DESIGN
1.5 Security
Data security is the final non functional requirement of the project of New Access in
the Headspace organization. There are three major features of the New Access project, which
are scalability, testability and configurability (O’Driscoll, Daugelaite & Sleator, 2013). These
three distinct features ensure thee flexibility, scalability and testability of the project.
Moreover, the applications could be easily configured and hence the non functional
requirement is extremely efficient as well as effective for this particular project in Headspace.
2. Cloud Solutions: Use of Several Types of Clouds
Cloud computing is termed as one of the major as well as the most efficient technique
that is eventually utilized for the core purpose of data transfer through the connection of
Internet (Chen et al., 2016). The speed of data transfer is extremely high. The three cloud
solutions for New Access project are provided below:
i) Public Cloud: This type of cloud is responsible for providing data access in a public
network or without having any type of restriction. The security of public cloud is not at all
effective since the architecture is not strong.
ii) Private Cloud: Private cloud is considered as one of the most safe and secured
cloud deployment model, which allows data access in private groups and securely (Sadiku,
Musa & Momoh, 2014).
iii) Hybrid Cloud: The proper amalgamation of private and public clouds is together
termed as the hybrid cloud. It gets advantages of both the cloud services.
The best cloud solution for New Access project is the hybrid cloud. Since, all the
advantages of public and private clouds are present here, it is recommended for Headspace
(Whaiduzzaman et al., 2014).
1.5 Security
Data security is the final non functional requirement of the project of New Access in
the Headspace organization. There are three major features of the New Access project, which
are scalability, testability and configurability (O’Driscoll, Daugelaite & Sleator, 2013). These
three distinct features ensure thee flexibility, scalability and testability of the project.
Moreover, the applications could be easily configured and hence the non functional
requirement is extremely efficient as well as effective for this particular project in Headspace.
2. Cloud Solutions: Use of Several Types of Clouds
Cloud computing is termed as one of the major as well as the most efficient technique
that is eventually utilized for the core purpose of data transfer through the connection of
Internet (Chen et al., 2016). The speed of data transfer is extremely high. The three cloud
solutions for New Access project are provided below:
i) Public Cloud: This type of cloud is responsible for providing data access in a public
network or without having any type of restriction. The security of public cloud is not at all
effective since the architecture is not strong.
ii) Private Cloud: Private cloud is considered as one of the most safe and secured
cloud deployment model, which allows data access in private groups and securely (Sadiku,
Musa & Momoh, 2014).
iii) Hybrid Cloud: The proper amalgamation of private and public clouds is together
termed as the hybrid cloud. It gets advantages of both the cloud services.
The best cloud solution for New Access project is the hybrid cloud. Since, all the
advantages of public and private clouds are present here, it is recommended for Headspace
(Whaiduzzaman et al., 2014).
SYSTEM ANALYSIS AND DESIGN
2.1 Strengths of Hybrid Cloud
The advantages of hybrid cloud are as follows:
i) Lesser Time Consumption: The total time consumption for data transfer is quite
less and thus it is quite popular for the users (Avram, 2014).
ii) Better Flexibility: Hybrid cloud is extremely scalable and flexible and thus is quite
effective for all.
2.2 Weaknesses of Hybrid Cloud
The disadvantages of hybrid cloud are as follows:
i) Quite Expensive: This hybrid cloud is quite costly and hence it is not being
afforded by all users (Suo et al., 2013).
ii) Weaker Networks: Another disadvantage of the hybrid cloud is that it never
provides strong networks for the users.
3. SDLC Approach
SDLC approach or the software development life cycle approach is considered as one
of the major and the most significant approaches in any project. This specific approach is
being utilized within each and every information system, software and system engineering for
the core purpose of describing the entire process of project planning, project creating, project
testing and then project deployment of the information system or IS (Wei et al., 2014). This
project deployment is done for Headspace organization. The overall effectiveness and
efficiency are extremely high and better for each and every project.
The two significant approaches of the software development life cycle that could be
taken into consideration for the project of New Access in Headspace organization are termed
as predictive approach and adaptive approach.
2.1 Strengths of Hybrid Cloud
The advantages of hybrid cloud are as follows:
i) Lesser Time Consumption: The total time consumption for data transfer is quite
less and thus it is quite popular for the users (Avram, 2014).
ii) Better Flexibility: Hybrid cloud is extremely scalable and flexible and thus is quite
effective for all.
2.2 Weaknesses of Hybrid Cloud
The disadvantages of hybrid cloud are as follows:
i) Quite Expensive: This hybrid cloud is quite costly and hence it is not being
afforded by all users (Suo et al., 2013).
ii) Weaker Networks: Another disadvantage of the hybrid cloud is that it never
provides strong networks for the users.
3. SDLC Approach
SDLC approach or the software development life cycle approach is considered as one
of the major and the most significant approaches in any project. This specific approach is
being utilized within each and every information system, software and system engineering for
the core purpose of describing the entire process of project planning, project creating, project
testing and then project deployment of the information system or IS (Wei et al., 2014). This
project deployment is done for Headspace organization. The overall effectiveness and
efficiency are extremely high and better for each and every project.
The two significant approaches of the software development life cycle that could be
taken into consideration for the project of New Access in Headspace organization are termed
as predictive approach and adaptive approach.
SYSTEM ANALYSIS AND DESIGN
3.1 Predictive SDLC Approach
This is the first and the foremost approach of the software development life cycle in
this specific medical project of the New Access in Headspace organization. The entire life
cycle of any particular project is properly monitored by undertaking the predictive approach
(Xia et al., 2016). This predictive SDLC approach is only applied when the project schedule
is properly definite as well as clear. The most significant advantages and disadvantages of the
predictive SDLC approach are provided below:
Pros:
i) Accurate Project Plan: The first as well as the most important and significant
advantage of tis predictive approach is that it provides a proper and accurate project plan to
the project team members.
ii) Clear Scope and Schedule: The overall project scope and schedule are absolutely
clear and proper and hence the users do not face any issue due to this.
iii) Proper Tracking of Project: The entire progress of the project is eventually
tracked periodically and thus popularity is maintained.
Cons:
i) No Alteration in Project Plan: The first and the most significant disadvantage of
this particular predictive approach is that it allows no alteration within the respective project
plan (Suo et al., 2013). Thus, changes are not possible.
ii) No Consideration of Clients’ Feedbacks: The clients’ feedbacks could not be
considered at any circumstances by the project manager and hence the clients are often
dissatisfied with the overall results.
3.1 Predictive SDLC Approach
This is the first and the foremost approach of the software development life cycle in
this specific medical project of the New Access in Headspace organization. The entire life
cycle of any particular project is properly monitored by undertaking the predictive approach
(Xia et al., 2016). This predictive SDLC approach is only applied when the project schedule
is properly definite as well as clear. The most significant advantages and disadvantages of the
predictive SDLC approach are provided below:
Pros:
i) Accurate Project Plan: The first as well as the most important and significant
advantage of tis predictive approach is that it provides a proper and accurate project plan to
the project team members.
ii) Clear Scope and Schedule: The overall project scope and schedule are absolutely
clear and proper and hence the users do not face any issue due to this.
iii) Proper Tracking of Project: The entire progress of the project is eventually
tracked periodically and thus popularity is maintained.
Cons:
i) No Alteration in Project Plan: The first and the most significant disadvantage of
this particular predictive approach is that it allows no alteration within the respective project
plan (Suo et al., 2013). Thus, changes are not possible.
ii) No Consideration of Clients’ Feedbacks: The clients’ feedbacks could not be
considered at any circumstances by the project manager and hence the clients are often
dissatisfied with the overall results.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SYSTEM ANALYSIS AND DESIGN
3.2 Adaptive SDLC Approach
The second popular and important approach of the software development life cycle in
this typical medical project of New Access in Headspace is the adaptive approach. Within the
adaptive approach, the plan of project is not made before the respective project initiation
(O’Driscoll, Daugelaite & Sleator, 2013). The several project deliverables are subsequently
provided in each and every phase and this makes the project execution quite easier. The most
significant advantages and disadvantages of the adaptive SDLC approach are provided
below:
Pros:
i) Allows Modifications: Adaptive approach has the major advantage of allowing
subsequent modifications in all phases of any specific project.
ii) Considers Clients’ Feedbacks: The next important and significant advantage of
this particular adaptive approach is that all the feedbacks of clients are considered here.
Cons:
i) Extremely Expensive: The first and the foremost demerit of this adaptive approach
is that the overall costs are quite high in respect to all other approaches and hence it becomes
quite problematic to afford this approach (Arora, Parashar & Transforming, 2013).
ii) Unclear Project Scope: The respective project scope as well as project schedule
for this particular approach of adaptive is absolutely unclear and hence the project is not
being understood by all.
3.3 Recommended SDLC Approach
New Access project is introduced by Headspace Company to treat the youth
individuals, those who have mental illness easily and promptly. These patients are
3.2 Adaptive SDLC Approach
The second popular and important approach of the software development life cycle in
this typical medical project of New Access in Headspace is the adaptive approach. Within the
adaptive approach, the plan of project is not made before the respective project initiation
(O’Driscoll, Daugelaite & Sleator, 2013). The several project deliverables are subsequently
provided in each and every phase and this makes the project execution quite easier. The most
significant advantages and disadvantages of the adaptive SDLC approach are provided
below:
Pros:
i) Allows Modifications: Adaptive approach has the major advantage of allowing
subsequent modifications in all phases of any specific project.
ii) Considers Clients’ Feedbacks: The next important and significant advantage of
this particular adaptive approach is that all the feedbacks of clients are considered here.
Cons:
i) Extremely Expensive: The first and the foremost demerit of this adaptive approach
is that the overall costs are quite high in respect to all other approaches and hence it becomes
quite problematic to afford this approach (Arora, Parashar & Transforming, 2013).
ii) Unclear Project Scope: The respective project scope as well as project schedule
for this particular approach of adaptive is absolutely unclear and hence the project is not
being understood by all.
3.3 Recommended SDLC Approach
New Access project is introduced by Headspace Company to treat the youth
individuals, those who have mental illness easily and promptly. These patients are
SYSTEM ANALYSIS AND DESIGN
continuously asked about their illness by the health professionals and they are uncomfortable
in sharing these details. New Access project is will be mitigating all of these issues and for
this deployment, predictive software development life cycle will be the best and would
provide better efficiency and effectiveness to them. The main reason for this is that predictive
approach provides better project planning and the implementation costs are quite less.
Conclusion
Therefore, conclusion is drawn from the report that this New Access project was
introduced by Headspace organization. The proper improvisation of the management of data
would also be done with this particular project. All the young individuals, who have the age
between 18 and 25 years and are suffering from mental illness will be having benefits from
this specific information system. These young patients are asked several questions about their
illness and problems again and again and hence they often feel uncomfortable due to this.
Moreover, the doctors also ask questions to their parents or family members and even they
are unable to communicate with the patients. To solve these significant issues of the mental
patients, New Access project is being launched for the organization of Headspace. The report
has eventually explained the several non functional requirement of FURPS or the
functionality, usability, reliability, performance and security to this New Access project for
the organization of Headspace. The cloud based solutions are also important for this project
and a proper cloud based solution is selected after considering the several strengths and
weaknesses. This report has even provided a recommendation of the software development
life cycle approach after analysing predictive and adaptive approaches.
continuously asked about their illness by the health professionals and they are uncomfortable
in sharing these details. New Access project is will be mitigating all of these issues and for
this deployment, predictive software development life cycle will be the best and would
provide better efficiency and effectiveness to them. The main reason for this is that predictive
approach provides better project planning and the implementation costs are quite less.
Conclusion
Therefore, conclusion is drawn from the report that this New Access project was
introduced by Headspace organization. The proper improvisation of the management of data
would also be done with this particular project. All the young individuals, who have the age
between 18 and 25 years and are suffering from mental illness will be having benefits from
this specific information system. These young patients are asked several questions about their
illness and problems again and again and hence they often feel uncomfortable due to this.
Moreover, the doctors also ask questions to their parents or family members and even they
are unable to communicate with the patients. To solve these significant issues of the mental
patients, New Access project is being launched for the organization of Headspace. The report
has eventually explained the several non functional requirement of FURPS or the
functionality, usability, reliability, performance and security to this New Access project for
the organization of Headspace. The cloud based solutions are also important for this project
and a proper cloud based solution is selected after considering the several strengths and
weaknesses. This report has even provided a recommendation of the software development
life cycle approach after analysing predictive and adaptive approaches.
SYSTEM ANALYSIS AND DESIGN
References
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of
cloud computing and internet of things. In Future internet of things and cloud
(FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-
2808.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing
by small and medium businesses. International Journal of Information
Management, 33(5), 861-874.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of internet services and
applications, 4(1), 5.
Herbst, N. R., Kounev, S., & Reussner, R. H. (2013, June). Elasticity in Cloud Computing:
What It Is, and What It Is Not. In ICAC (Vol. 13, pp. 23-27).
References
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of
cloud computing and internet of things. In Future internet of things and cloud
(FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-
2808.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing
by small and medium businesses. International Journal of Information
Management, 33(5), 861-874.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of internet services and
applications, 4(1), 5.
Herbst, N. R., Kounev, S., & Reussner, R. H. (2013, June). Elasticity in Cloud Computing:
What It Is, and What It Is Not. In ICAC (Vol. 13, pp. 23-27).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SYSTEM ANALYSIS AND DESIGN
O’Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). ‘Big data’, Hadoop and cloud
computing in genomics. Journal of biomedical informatics, 46(5), 774-781.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and
challenges. IEEE potentials, 33(1), 34-36.
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud
computing. In Wireless Communications and Mobile Computing Conference
(IWCMC), 2013 9th International (pp. 655-659). IEEE.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security
and privacy for storage and computation in cloud computing. Information
Sciences, 258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular
cloud computing. Journal of Network and Computer Applications, 40, 325-344.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
O’Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). ‘Big data’, Hadoop and cloud
computing in genomics. Journal of biomedical informatics, 46(5), 774-781.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and
challenges. IEEE potentials, 33(1), 34-36.
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud
computing. In Wireless Communications and Mobile Computing Conference
(IWCMC), 2013 9th International (pp. 655-659). IEEE.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security
and privacy for storage and computation in cloud computing. Information
Sciences, 258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular
cloud computing. Journal of Network and Computer Applications, 40, 325-344.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.