default search action
Search dblp for Publications
export results for "toc:db/journals/ijcc/ijcc3.bht:"
@article{DBLP:journals/ijcc/Alashoor14, author = {Tawfiq Alashoor}, title = {Cloud computing: a review of security issues and solutions}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {3}, pages = {228--244}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.064760}, doi = {10.1504/IJCC.2014.064760}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/Alashoor14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/AmatoLRV14, author = {Alba Amato and Loredana Liccardo and Massimiliano Rak and Salvatore Venticinque}, title = {SLA-based negotiation and brokering of cloud resources}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {1}, pages = {24--44}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.058829}, doi = {10.1504/IJCC.2014.058829}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/AmatoLRV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/BabuK14, author = {L. D. Dhinesh Babu and Parimala Venkata Krishna}, title = {An execution environment oriented approach for scheduling dependent tasks of cloud computing workflows}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {2}, pages = {209--224}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.062275}, doi = {10.1504/IJCC.2014.062275}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/BabuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/BhaleraoBJZA14, author = {Rahul Bhalerao and Madhur Bajpai and Avinash Jadhao and Shashikant Zalte and Jibi Abraham}, title = {Secure process migration in cloud for load balancing and energy efficiency}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {3}, pages = {288--314}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.064753}, doi = {10.1504/IJCC.2014.064753}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/BhaleraoBJZA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/BhardwajK14, author = {Aashish Bhardwaj and Vikas Kumar}, title = {Identity management practices in cloud computing environments}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {2}, pages = {143--157}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.062271}, doi = {10.1504/IJCC.2014.062271}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcc/BhardwajK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/BhattacharjeeM14, author = {Shameek Bhattacharjee and Dan C. Marinescu}, title = {A cloud service for trust management in cognitive radio networks}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {4}, pages = {326--353}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.066785}, doi = {10.1504/IJCC.2014.066785}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/BhattacharjeeM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/BittermanCBHLCGZCLR14, author = {Thomas Bitterman and Prasad Calyam and Alex Berryman and David E. Hudak and Lin Li and Alan Chalker and Steve Gordon and Da Zhang and Da Cai and Changpil Lee and Rajiv Ramnath}, title = {Simulation as a service (SMaaS): a cloud-based framework to support the educational use of scientific software}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {2}, pages = {177--190}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.062272}, doi = {10.1504/IJCC.2014.062272}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcc/BittermanCBHLCGZCLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/BrockG14, author = {Michael Brock and Andrzej M. Goscinski}, title = {Multi-cloud application execution and data management}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {4}, pages = {354--378}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.066789}, doi = {10.1504/IJCC.2014.066789}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/BrockG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/CalyamBWSRR14, author = {Prasad Calyam and Alex Berryman and David Welling and Mohan Saravanan and Rajiv Ramnath and Jay Ramanathan}, title = {VDPilot: feasibility study of hosting virtual desktops for classroom labs within a federated university system}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {2}, pages = {158--176}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.062274}, doi = {10.1504/IJCC.2014.062274}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/CalyamBWSRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/GallowayLV14, author = {Jeffrey Michael Galloway and Gabriel Loewen and Susan V. Vrbsky}, title = {Deploying a cost efficient geographically distributed private cloud architecture}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {2}, pages = {125--142}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.062270}, doi = {10.1504/IJCC.2014.062270}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/GallowayLV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/GillamLO14, author = {Lee Gillam and Bin Li and John O'Loughlin}, title = {Benchmarking cloud performance for service level agreement parameters}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {1}, pages = {3--23}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.058828}, doi = {10.1504/IJCC.2014.058828}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/GillamLO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/GofmanLWHYG14, author = {Mikhail I. Gofman and Ruiqi Luo and Chad Wyszynski and Yaohui Hu and Ping Yang and Kartik Gopalan}, title = {Privacy-preserving virtual machine checkpointing mechanism}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {3}, pages = {245--266}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.064766}, doi = {10.1504/IJCC.2014.064766}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/GofmanLWHYG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/MelandBJCU14, author = {Per H{\aa}kon Meland and Karin Bernsmed and Martin Gilje Jaatun and Humberto Nicol{\'{a}}s Castej{\'{o}}n Mart{\'{\i}}nez and Astrid Undheim}, title = {Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {1}, pages = {69--93}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.058831}, doi = {10.1504/IJCC.2014.058831}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/MelandBJCU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/NeroNS14, author = {Chris Nero and Anindya Neogi and Venkata Ramesh Somisetty}, title = {Optimising the cloud infrastructure: tool design and a case study}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {2}, pages = {191--208}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.062273}, doi = {10.1504/IJCC.2014.062273}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/NeroNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/PapanikolaouPMK14, author = {Nick Papanikolaou and Siani Pearson and Marco Casassa Mont and Ryan K. L. Ko}, title = {A toolkit for automating compliance in cloud computing services}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {1}, pages = {45--68}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.058830}, doi = {10.1504/IJCC.2014.058830}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/PapanikolaouPMK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/PearsonT14, author = {Siani Pearson and Prodromos Tsiavos}, title = {Taking the Creative Commons beyond copyright: developing Smart Notices as user centric consent management systems for the cloud}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {1}, pages = {94--124}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.058832}, doi = {10.1504/IJCC.2014.058832}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/PearsonT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/RawatSR14, author = {Danda B. Rawat and Sachin Shetty and Khurram Raza}, title = {Geolocation-aware resource management in cloud computing-based cognitive radio networks}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {3}, pages = {267--287}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.064765}, doi = {10.1504/IJCC.2014.064765}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/RawatSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/XiongP14, author = {Kaiqi Xiong and Harry G. Perros}, title = {Resilient and performance-guaranteed composite services in cloud computing}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {4}, pages = {315--325}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.066825}, doi = {10.1504/IJCC.2014.066825}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/XiongP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/ZunnurhainVH14, author = {Kazi Zunnurhain and Susan V. Vrbsky and Ragib Hasan}, title = {{FAPA:} flooding attack protection architecture in a cloud system}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {4}, pages = {379--401}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.066790}, doi = {10.1504/IJCC.2014.066790}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/ZunnurhainVH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.