default search action
Search dblp for Publications
export results for "toc:db/journals/ijcc/ijcc1.bht:"
@article{DBLP:journals/ijcc/DhageM12, author = {Sudhir N. Dhage and B. B. Meshram}, title = {Intrusion detection system in cloud computing environment}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {261--282}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046711}, doi = {10.1504/IJCC.2012.046711}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/DhageM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/JingCZW12, author = {Lei Jing and Zixue Cheng and Yinghui Zhou and Junbo Wang}, title = {Transparent services selecting and loading with wearable devices}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {4}, pages = {351--366}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.049767}, doi = {10.1504/IJCC.2012.049767}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/JingCZW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/KumarS12, author = {P. Syam Kumar and R. Subramanian}, title = {RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {167--200}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046719}, doi = {10.1504/IJCC.2012.046719}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/KumarS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/Ming12, author = {Wu Ming}, title = {Analysis and a case study of transparent computing implementation with {UEFI}}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {4}, pages = {312--328}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.049765}, doi = {10.1504/IJCC.2012.049765}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/Ming12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/MukherjeeS12, author = {K. Mukherjee and G. Sahoo}, title = {A novel methodology for secured c-governance using Hadamard coding}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {145--166}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046718}, doi = {10.1504/IJCC.2012.046718}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/MukherjeeS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/NepalP12, author = {Surya Nepal and Mukaddim Pathan}, title = {Editorial}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {101--118}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046732}, doi = {10.1504/IJCC.2012.046732}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/NepalP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/PetriRRS12, author = {Ioan Petri and Omer F. Rana and Yacine Rezgui and Gheorghe Cosmin Silaghi}, title = {Trust modelling and analysis in peer-to-peer clouds}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {221--239}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046714}, doi = {10.1504/IJCC.2012.046714}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcc/PetriRRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/QiYZSJM12, author = {Yihong Qi and Wei Yu and Rongrong Zhang and George Shaker and Perry Jarmuszewski and George Mankaruse}, title = {Transparent mobile service terminal: an overview}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {4}, pages = {302--311}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.049764}, doi = {10.1504/IJCC.2012.049764}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/QiYZSJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/TakabiJ12, author = {Hassan Takabi and James B. D. Joshi}, title = {Semantic-based policy management for cloud computing environments}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {119--144}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046717}, doi = {10.1504/IJCC.2012.046717}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/TakabiJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/XueD12, author = {Haiwei Xue and Yiqi Dai}, title = {A privacy protection model for transparent computing system}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {4}, pages = {367--384}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.049768}, doi = {10.1504/IJCC.2012.049768}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/XueD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/YaoCWLZ12, author = {Jinhui Yao and Shiping Chen and Chen Wang and David Levy and John Zic}, title = {Accountability services for verifying compliance in the cloud}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {240--260}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046721}, doi = {10.1504/IJCC.2012.046721}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/YaoCWLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/ZhangZ12, author = {Yaoxue Zhang and Yuezhi Zhou}, title = {TransOS: a transparent computing-based operating system for the cloud}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {4}, pages = {287--301}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.049763}, doi = {10.1504/IJCC.2012.049763}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/ZhangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/ZhaoHXC12, author = {Yangyang Zhao and Wentao Han and Ruini Xue and Wenguang Chen}, title = {{SMILE:} streaming management of applications and data for mobile terminals}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {4}, pages = {329--350}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.049766}, doi = {10.1504/IJCC.2012.049766}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/ZhaoHXC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/ZhouVH12, author = {Lan Zhou and Vijay Varadharajan and Michael Hitchens}, title = {A flexible cryptographic approach for secure data storage in the cloud using role-based access control}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {201--220}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046720}, doi = {10.1504/IJCC.2012.046720}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/ZhouVH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/GoscinskiB11, author = {Andrzej M. Goscinski and Michael Brock}, title = {Toward higher level abstractions for cloud computing}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {1}, pages = {37--57}, year = {2011}, url = {https://doi.org/10.1504/IJCC.2011.043245}, doi = {10.1504/IJCC.2011.043245}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/GoscinskiB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/PeirisSB11, author = {Chris Peiris and Dharmendra Sharma and Bala M. Balachandran}, title = {{C2TP:} a service model for cloud}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {1}, pages = {3--22}, year = {2011}, url = {https://doi.org/10.1504/IJCC.2011.043243}, doi = {10.1504/IJCC.2011.043243}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/PeirisSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/RadwanYSG11, author = {Ahmed Radwan and Akmal A. Younis and Santhosh Srinivasan and Abhay Gupta}, title = {{MR-LEGOS:} a refined MapReduce model}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {1}, pages = {58--80}, year = {2011}, url = {https://doi.org/10.1504/IJCC.2011.043246}, doi = {10.1504/IJCC.2011.043246}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/RadwanYSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/Sasikala11, author = {P. Sasikala}, title = {Cloud computing: present status and future implications}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {1}, pages = {23--36}, year = {2011}, url = {https://doi.org/10.1504/IJCC.2011.043244}, doi = {10.1504/IJCC.2011.043244}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/Sasikala11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/XiongRRRVP11, author = {Naixue Xiong and Andy J. Rindos and Michael L. Russell and Kelly P. Robinson and Art Vandenberg and Yi Pan}, title = {Sharing computing resources to satisfy multi-cloud user requirements}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {1}, pages = {81--100}, year = {2011}, url = {https://doi.org/10.1504/IJCC.2011.043247}, doi = {10.1504/IJCC.2011.043247}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/XiongRRRVP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.