default search action
International Journal of Cloud Computing, Volume 3
Volume 3, Number 1, 2014
- Lee Gillam, Bin Li, John O'Loughlin:
Benchmarking cloud performance for service level agreement parameters. 3-23 - Alba Amato, Loredana Liccardo, Massimiliano Rak, Salvatore Venticinque:
SLA-based negotiation and brokering of cloud resources. 24-44 - Nick Papanikolaou, Siani Pearson, Marco Casassa Mont, Ryan K. L. Ko:
A toolkit for automating compliance in cloud computing services. 45-68 - Per Håkon Meland, Karin Bernsmed, Martin Gilje Jaatun, Humberto Nicolás Castejón Martínez, Astrid Undheim:
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers. 69-93 - Siani Pearson, Prodromos Tsiavos:
Taking the Creative Commons beyond copyright: developing Smart Notices as user centric consent management systems for the cloud. 94-124
Volume 3, Number 2, 2014
- Jeffrey Michael Galloway, Gabriel Loewen, Susan V. Vrbsky:
Deploying a cost efficient geographically distributed private cloud architecture. 125-142 - Aashish Bhardwaj, Vikas Kumar:
Identity management practices in cloud computing environments. 143-157 - Prasad Calyam, Alex Berryman, David Welling, Mohan Saravanan, Rajiv Ramnath, Jay Ramanathan:
VDPilot: feasibility study of hosting virtual desktops for classroom labs within a federated university system. 158-176 - Thomas Bitterman, Prasad Calyam, Alex Berryman, David E. Hudak, Lin Li, Alan Chalker, Steve Gordon, Da Zhang, Da Cai, Changpil Lee, Rajiv Ramnath:
Simulation as a service (SMaaS): a cloud-based framework to support the educational use of scientific software. 177-190 - Chris Nero, Anindya Neogi, Venkata Ramesh Somisetty:
Optimising the cloud infrastructure: tool design and a case study. 191-208 - L. D. Dhinesh Babu, Parimala Venkata Krishna:
An execution environment oriented approach for scheduling dependent tasks of cloud computing workflows. 209-224
Volume 3, Number 3, 2014
- Tawfiq Alashoor:
Cloud computing: a review of security issues and solutions. 228-244 - Mikhail I. Gofman, Ruiqi Luo, Chad Wyszynski, Yaohui Hu, Ping Yang, Kartik Gopalan:
Privacy-preserving virtual machine checkpointing mechanism. 245-266 - Danda B. Rawat, Sachin Shetty, Khurram Raza:
Geolocation-aware resource management in cloud computing-based cognitive radio networks. 267-287 - Rahul Bhalerao, Madhur Bajpai, Avinash Jadhao, Shashikant Zalte, Jibi Abraham:
Secure process migration in cloud for load balancing and energy efficiency. 288-314
Volume 3, Number 4, 2014
- Kaiqi Xiong, Harry G. Perros:
Resilient and performance-guaranteed composite services in cloud computing. 315-325 - Shameek Bhattacharjee, Dan C. Marinescu:
A cloud service for trust management in cognitive radio networks. 326-353 - Michael Brock, Andrzej M. Goscinski:
Multi-cloud application execution and data management. 354-378 - Kazi Zunnurhain, Susan V. Vrbsky, Ragib Hasan:
FAPA: flooding attack protection architecture in a cloud system. 379-401
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.