default search action
International Journal of Cloud Applications and Computing, Volume 6
Volume 6, Number 1, 2016
- Nitin Nagar, Ugrasen Suman:
Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack. 1-14 - Amin Nezarat, Gh. Dastghaibifard:
A Game Theoretic Method for Resource Allocation in Scientific Cloud. 15-41 - Mariam Kiran, Anthony J. H. Simons:
Testing Software Services in Cloud Ecosystems. 42-58 - Amer Al-Badarneh, Amr Mohammad, Salah Harb:
A Survey on MapReduce Implementations. 59-87
Volume 6, Number 2, 2016
- Chaima Bensaid, Sofiane Boukli Hacene, Kamel Mohamed Faraoun:
Detection and Ignoring of Blackhole Attack in Vanets Networks. 1-10 - Yassine Rhazali, Youssef Hadi, Abdelaziz Mouloudi:
A Based-Rule Method to Transform CIM to PIM into MDA. 11-24 - Mohammed Rasol, Bassam Al Kasasbeh, Farah Al Adwan:
An Improved Secure SIP Registration Mechanism to Avoid VoIP Threats. 25-36 - Beatriz Adriana Gomez, Kailash Evans:
A Practical Application of TrimCloud: Using TrimCloud as an Educational Technology in Developing Countries. 37-48 - Omar Sabri:
Applying the Updated Delone and Mclean is Success Model for Enterprise Cloud Computing Readiness. 49-54 - Goknur Arzu Akyuz, Mohammad Rehan:
A Generic, Multi-Period and Multi-Partner Cost Optimizing Model for Cloud-Based Supply Chain. 55-63 - Mohit Mathur, Mamta Madan, Kavita Chaudhary:
A Satiated Method for Cloud Traffic Classification in Software Defined Network Environment. 64-79
Volume 6, Number 3, 2016
- Ruchika Asija, Rajarathnam Nallusamy:
Healthcare SaaS Based on a Data Model with Built-In Security and Privacy. 1-14 - Usha Divakarla, K. Chandrasekaran:
Enhanced Trust Path between Two Entities in Cloud Computing Environment. 15-31 - Mouna Jouini, Latifa Ben Arfa Rabai:
A Security Framework for Secure Cloud Computing Environments. 32-44 - Sabah Abdullah Al-Somali, Hanan Baghabra:
Investigating the Determinants of IT Professionals' Intention to Use Cloud-Based Applications and Solutions: An Extension of the Technology Acceptance. 45-62
Volume 6, Number 4, 2016
- Sohan Kumar Pande, Sanjaya Kumar Panda, Satyabrata Das:
A Customer-Oriented Task Scheduling for Heterogeneous Multi-Cloud Environment. 1-17 - Partha Ghosh, Shivam Shakti, Santanu Phadikar:
A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule. 18-35 - Curtis J. Muller, Aaron Christopher Davis:
NoSQL Application Redesign may be Unnecessary for Most Corporation Cloud Migration Deployments. 36-64 - Yassine Bounagui, Hatim Hafiddi, Abdellatif Mezrioui:
COBIT Evaluation as a Framework for Cloud Computing Governance. 65-82 - Akashdeep Bhardwaj, Sam Goundar:
Designing a Framework for Cloud Service Agreement for Cloud Environments. 83-96 - Rekha Kashyap, Deo Prakash Vidyarthi:
A Secured Real Time Scheduling Model for Cloud Hypervisor. 97-110
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.