


default search action
International Journal of Cloud Computing, Volume 7
Volume 7, Number 1, 2018
- D. I. George Amalarethinam, H. M. Leena:
A new key generation technique using GA for enhancing data security in cloud environment. 4-14 - M. Y. Mohamed Parvees, J. Abdul Samath, B. Parameswaran Bose:
Confidential storage of medical images - a chaos-based encryption approach. 15-39 - K. Sudharani, P. N. K. Sakthivel:
A secure encryption scheme based on certificateless proxy signature. 40-64 - Kirit Modi, Debabrata Paul Chowdhury, Sanjay Garg:
Automatic cloud service monitoring and management with prediction-based service provisioning. 65-82
Volume 7, Number 2, 2018
- Frederic Nzanywayingoma, Yang Yang:
Task scheduling and virtual resource optimising in Hadoop YARN-based cloud computing environment. 83-102 - Ji Liu, Esther Pacitti, Patrick Valduriez:
A survey of scheduling frameworks in big data systems. 103-128 - Satish Narayana Srirama, Alireza Ostovar:
Optimal cloud resource provisioning for auto-scaling enterprise applications. 129-162 - Eric Kuada:
A game theory-based design of incentive schemes for social cloud services. 163-183
Volume 7, Numbers 3/4, 2018
- Anand Singh, Yannis Viniotis:
Cloud-based environment in support of IoT education. 187-203 - Szilárd Bozóki, András Pataricza:
Extreme value analysis for capacity design. 204-225 - Donghoon Kim, Mladen A. Vouk:
A formal model towards scientific workflow security in a cloud. 226-236 - Gokul Bhandari:
A tale of two cloud analytics platforms for education. 237-247 - Laud Charles Ochei, Andrei Petrovski, Julian M. Bass:
A framework for achieving the required degree of multitenancy isolation for deploying components of a cloud-hosted service. 248-281 - Panagiotis Patros, Kenneth B. Kent
, Michael Dawson:
Why is garbage collection causing my service level objectives to fail? 282-322 - Xianqing Yu, Mladen A. Vouk, Young-Hyun Oh:
SECross: securing cross cloud boundary. 323-335 - Imre Kocsis, Attila Klenik, András Pataricza, Miklós Telek, Flórián Deé, Dávid Cseh:
Systematic performance evaluation using component-in-the-loop approach. 336-357

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.