


default search action
International Journal of Cloud Computing, Volume 7
Volume 7, Number 1, 2018
- D. I. George Amalarethinam, H. M. Leena:

A new key generation technique using GA for enhancing data security in cloud environment. 4-14 - M. Y. Mohamed Parvees, J. Abdul Samath, B. Parameswaran Bose:

Confidential storage of medical images - a chaos-based encryption approach. 15-39 - K. Sudharani, P. N. K. Sakthivel:

A secure encryption scheme based on certificateless proxy signature. 40-64 - Kirit Modi, Debabrata Paul Chowdhury, Sanjay Garg:

Automatic cloud service monitoring and management with prediction-based service provisioning. 65-82
Volume 7, Number 2, 2018
- Frederic Nzanywayingoma, Yang Yang:

Task scheduling and virtual resource optimising in Hadoop YARN-based cloud computing environment. 83-102 - Ji Liu, Esther Pacitti, Patrick Valduriez:

A survey of scheduling frameworks in big data systems. 103-128 - Satish Narayana Srirama, Alireza Ostovar:

Optimal cloud resource provisioning for auto-scaling enterprise applications. 129-162 - Eric Kuada:

A game theory-based design of incentive schemes for social cloud services. 163-183
Volume 7, Numbers 3/4, 2018
- Anand Singh, Yannis Viniotis:

Cloud-based environment in support of IoT education. 187-203 - Szilárd Bozóki, András Pataricza:

Extreme value analysis for capacity design. 204-225 - Donghoon Kim, Mladen A. Vouk:

A formal model towards scientific workflow security in a cloud. 226-236 - Gokul Bhandari:

A tale of two cloud analytics platforms for education. 237-247 - Laud Charles Ochei, Andrei Petrovski, Julian M. Bass:

A framework for achieving the required degree of multitenancy isolation for deploying components of a cloud-hosted service. 248-281 - Panagiotis Patros, Kenneth B. Kent

, Michael Dawson:
Why is garbage collection causing my service level objectives to fail? 282-322 - Xianqing Yu, Mladen A. Vouk, Young-Hyun Oh:

SECross: securing cross cloud boundary. 323-335 - Imre Kocsis, Attila Klenik, András Pataricza, Miklós Telek, Flórián Deé, Dávid Cseh:

Systematic performance evaluation using component-in-the-loop approach. 336-357

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














