-
1
-
-
49149119622
-
Computing in the clouds
-
December
-
A. Weiss, "Computing in the clouds", netWorker, vol. 11, no. 4, pp. 16-25, December 2007.
-
(2007)
NetWorker
, vol.11
, Issue.4
, pp. 16-25
-
-
Weiss, A.1
-
2
-
-
77955519189
-
Autonomic metered pricing for a utility computing service
-
October
-
C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation Computer Systems, vol. 26, issue 8, pp. 1368-1380, October 2010.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.8
, pp. 1368-1380
-
-
Yeo, C.S.1
Venugopal, S.2
Chu, X.3
Buyya, R.4
-
3
-
-
0036908130
-
Grids and grid technologies for wide-area distributed computing
-
M. Baker, R. Buyya, and D. Laforenza, "Grids and grid technologies for wide-area distributed computing," International Journal of Software: Practice and Experience, vol.32, pp. 1437-1466, 2002.
-
(2002)
International Journal of Software: Practice and Experience
, vol.32
, pp. 1437-1466
-
-
Baker, M.1
Buyya, R.2
Laforenza, D.3
-
4
-
-
74049112206
-
Cloud security issues
-
September
-
B. R. Kandukuri, V, R. Paturi and A. Rakshit, "Cloud security issues," in Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517-520, September 2009.
-
(2009)
Proceedings of the 2009 IEEE International Conference on Services Computing
, pp. 517-520
-
-
Kandukuri, B.R.1
Paturi, V.R.2
Rakshit, A.3
-
5
-
-
25844499675
-
Autonomic computing
-
DOI 10.1007/s11334-005-0001-5
-
R. Sterritt, "Autonomic computing," Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-88. 2005. (Pubitemid 41683853)
-
(2005)
Innovations in Systems and Software Engineering
, vol.1
, Issue.1
, pp. 79-88
-
-
Sterritt, R.1
-
6
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
June
-
R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, issue 6, pp. 599-616, June 2008.
-
(2008)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
7
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
January
-
L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
-
(2009)
ACM SIGCOMM Computer Communication Review
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
8
-
-
78649686165
-
Cloud computing - A classification, business models, and research directions
-
C. Weinhardt, A. Anandasivam, B. Blau, N. Borissov, T. Meinl, W. Michalk, and J. Stößer, "Cloud computing - a classification, business models, and research directions," Business & Information Systems Engineering (BISE), vol. 1, no. 5, pp. 391-399, 2009.
-
(2009)
Business & Information Systems Engineering (BISE)
, vol.1
, Issue.5
, pp. 391-399
-
-
Weinhardt, C.1
Anandasivam, A.2
Blau, B.3
Borissov, N.4
Meinl, T.5
Michalk, W.6
Stößer, J.7
-
9
-
-
71749100243
-
Finding security in the cloud
-
October
-
N. Hawthorn, "Finding security in the cloud," Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
-
(2009)
Computer Fraud & Security
, vol.2009
, Issue.10
, pp. 19-20
-
-
Hawthorn, N.1
-
10
-
-
67650951127
-
Online data storage using implicit security
-
September
-
A. Parakh and S. Kak, "Online data storage using implicit security", Information Sciences, vol. 179, issue 19, pp. 3323-3333 ,September 2009.
-
(2009)
Information Sciences
, vol.179
, Issue.19
, pp. 3323-3333
-
-
Parakh, A.1
Kak, S.2
-
11
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp.120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
12
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Advances in Cryptology - CRYPTO '85
-
V. Miller, "Uses of elliptic curves in cryptography," Advances in Cryptology - CRYPTO '85, Lecture Notes in Computer Science, pp. 417-426, 1986.
-
(1986)
Lecture Notes in Computer Science
, pp. 417-426
-
-
Miller, V.1
-
13
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
14
-
-
33744979078
-
Design of an enhancement for SSL/TLS protocols
-
DOI 10.1016/j.cose.2006.02.007, PII S0167404806000319
-
A. Elgohary, T. S. Sobh, and M. Zaki, "Design of an enhancement for SSL/TLS protocols," Computers & Security, vol. 25, no. 4, pp. 297-306, June 2006. (Pubitemid 43866954)
-
(2006)
Computers and Security
, vol.25
, Issue.4
, pp. 297-306
-
-
Elgohary, A.1
Sobh, T.S.2
Zaki, M.3
-
15
-
-
77954407691
-
-
Salesforce.com, Inc Retrieved Dec.
-
Salesforce.com, Inc., "Force.com platform," Retrieved Dec. 2009, from http://www.salesforce.com/tw/
-
(2009)
Force.com Platform
-
-
-
16
-
-
79960226270
-
-
SAP AG Retrieved Jan.
-
SAP AG., "SAP services: maximize your success," Retrieved Jan. 2010, from http://www.sap.com/services/index.epx
-
(2010)
SAP Services: Maximize Your Success
-
-
-
17
-
-
52249115614
-
Services mashups: The new generation of web applications
-
D. Benslimane, S. Dustdar, and A. Sheth, "Services mashups: the new generation of web applications". IEEE Internet Computing, vol. 12, no. 5, pp. 13-15, 2008.
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.5
, pp. 13-15
-
-
Benslimane, D.1
Dustdar, S.2
Sheth, A.3
|