default search action
International Journal of Cloud Applications and Computing, Volume 10
Volume 10, Number 1, 2020
- Sanjay P. Ahuja, Nathan Wheeler:
Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications. 1-10 - Abdelwahhab Satta, Sihem Mostefai:
Strategic Outsourcing to Cloud Computing: A Comprehensive Framework Based on Analytic Hierarchy Process. 11-27 - Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse:
Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud. 28-45 - Saswati Sarkar, Anirban Kundu:
Performance Enhancement of Cloud Based Storage using Disk Scheduling Technique. 46-63 - Shweta Kaushik, Charu Gandhi:
Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing. 64-84
Volume 10, Number 2, 2020
- Muhammad Aliyu, Murali M., Abdulsalam Ya'u Gital, Souley Boukari:
Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree. 1-21 - Sudipta Sahana, Tanmoy Mukherjee, Debabrata Sarddar:
A Conceptual Framework Towards Implementing a Cloud-Based Dynamic Load Balancer Using a Weighted Round-Robin Algorithm. 22-35 - Hamid A. Jadad, Abderezak Touzene, Khaled Day:
Offloading as a Service Middleware for Mobile Cloud Apps. 36-55 - K. DeviPriya, Sumalatha Lingamgunta:
Multi Factor Two-way Hash-Based Authentication in Cloud Computing. 56-76 - Sumathi M., S. Sangeetha:
Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System. 77-92
Volume 10, Number 3, 2020
- Sanjay P. Ahuja, Emily Czarnecki, Sean Willison:
Multi-Factor Performance Comparison of Amazon Web Services Elastic Compute Cluster and Google Cloud Platform Compute Engine. 1-16 - Ahmad Al Nawasrah, Ammar Ali Almomani, Samer Atawneh, Mohammad Alauthman:
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing. 17-53 - Arun Prasad Mohan, Mohamed Asfak R., Angelin Gladston:
Merkle Tree and Blockchain-Based Cloud Data Auditing. 54-66 - Ganeshayya Ishwarayya Shidaganti, Amogh Shreedhar Inamdar, Sindhuja V. Rai, Anagha M. Rajeev:
SCEF: A Model for Prevention of DDoS Attacks From the Cloud. 67-80 - Djouhra Dad, Ghalem Belalem:
Efficient Strategies of VMs Scheduling Based on Physicals Resources and Temperature Thresholds. 81-95 - Khalid Ali Rababah, Bilal Ali Yaseen Al-Nassar, Sana'a Nawaf Al-Nsour:
Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan. 96-110
Volume 10, Number 4, 2020
- Ashima Narang, Deepali Gupta, Amandeep Kaur:
Biometrics-Based Un-Locker to Enhance Cloud Security Systems. 1-12 - Ritu Bansal, Vikash Kumar Singh:
Proposed Technique for Efficient Cloud Computing Model in Effective Digital Training Towards Sustainable Livelihoods for Unemployed Youths. 13-27 - Alexander Bogislav Herzfeldt, Hans Peter Rauer, Reimar Weißbach, Christoph Ertl:
Cloud Computing as the Next Utility: Market Strategies for Cloud Service Providers. 28-47 - Acheampong Owusu:
Determinants of Cloud Business Intelligence Adoption Among Ghanaian SMEs. 48-69 - Boubaker Soltani, Afifa Ghenai, Nadia Zeghib:
Execution of Long-Duration Multi-Cloud Serverless Functions Using Selective Migration-Based Approach. 70-97
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.