Review Article
Mobile Cloud Computing: Taxonomy and Challenges
Table 7
Analysis of security and privacy techniques for MCC.
| Reference | Technique | Approach | Implementation | Metrics | SC | FW/AT | AL | EN | N-EN | CP | U-DT | EC | CT | RU | LT | EN/DN-T | CO |
| CMReS [38] | ✓ | ✓ | | ✓ | | | ✓ | ✓ | ✓ | ✓ | | | | ESACSM [39] | | ✓ | ✓ | ✓ | | | ✓ | | ✓ | | ✓ | ✓ | | RMTAC [40] | ✓ | | ✓ | | | ✓ | | | ✓ | | | | | EACDAC [41] | ✓ | ✓ | | ✓ | | ✓ | | | | | | | ✓ | PADMC [42] | ✓ | | | ✓ | | | | | ✓ | | | | |
|
|