-
1
-
-
85012229582
-
Security in the cloud
-
Anthens, G., "Security in the cloud," Communications of the ACM, Vol. 53, No. 11, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.11
-
-
Anthens, G.1
-
3
-
-
84893743342
-
-
Retrieved Sep 12, 2011
-
Brodkin, J., "Open source fuels growth of cloud computing, software-as-a-service," Retrieved Sep 12, 2011, from http://www.networkworld.com/news/2008/072808-open-source-cloud-computing.html, 2008.
-
(2008)
Open source fuels growth of cloud computing, software-as-a-service
-
-
Brodkin, J.1
-
5
-
-
77951859902
-
Cloud computing and electricity: beyond the utility model
-
Brynjolfsson, E., P. Hofmann, and J. Jordan, "Cloud computing and electricity: beyond the utility model," Communications of the ACM, Vol. 53, No. 5, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.5
-
-
Brynjolfsson, E.1
Hofmann, P.2
Jordan, J.3
-
6
-
-
80455164421
-
Cloud Computing Security
-
Carlin, S. and K. Curran, "Cloud Computing Security," International Journal of Ambient Computing and Intelligence, Vol. 3, No. 1:14-19, 2011.
-
(2011)
International Journal of Ambient Computing and Intelligence
, vol.3
, Issue.1
, pp. 14-19
-
-
Carlin, S.1
Curran, K.2
-
8
-
-
77956199016
-
An overview of virtual and cloud computing
-
Cervone, F. H.,"An overview of virtual and cloud computing," OCLC Systems & Services, Vol. 26, No. 3:162-165, 2010.
-
(2010)
OCLC Systems & Services
, vol.26
, Issue.3
, pp. 162-165
-
-
Cervone, F.H.1
-
9
-
-
10444286207
-
Web services enabled procurement in the extended enterprise: An architectural design and implementation
-
Chen, M and M.J. Meixell, "Web services enabled procurement in the extended enterprise: An architectural design and implementation," Journal of Electronic Commerce Research, Vol. 4, No.4:140:155, 2003.
-
(2003)
Journal of Electronic Commerce Research
, vol.4
, Issue.4
, pp. 140-155
-
-
Chen, M.1
Meixell, M.J.2
-
10
-
-
84865647879
-
-
Retrieved Sep 06, 2011
-
Cozza, R. "Forecast: Mobile Communications Devices by Open Operating System, Worldwide, 2008-2015," Retrieved Sep 06, 2011, from http://www.gartner.com/DisplayDocument?ref=clientFriendlyUrl&id=1619615, 2011.
-
(2011)
Forecast: Mobile Communications Devices by Open Operating System, Worldwide, 2008-2015
-
-
Cozza, R.1
-
11
-
-
77951870023
-
The IT Transformation at INTEL
-
Curley, M., "The IT Transformation at INTEL," MIS Quarterly Executive, Vol. 5, No. 4:155-168, 2006.
-
(2006)
MIS Quarterly Executive
, vol.5
, Issue.4
, pp. 155-168
-
-
Curley, M.1
-
12
-
-
4243089403
-
Negotiating in service-oriented environments
-
Elfatatry, A. and P. Layzell, "Negotiating in service-oriented environments," Communication of the ACM, Vol 47, No. 8, 2004.
-
(2004)
Communication of the ACM
, vol.47
, Issue.8
-
-
Elfatatry, A.1
Layzell, P.2
-
13
-
-
1442300340
-
The impact of electronic commerce on business-level strategies
-
Fruhling, A.L and L.A. Digman, "The impact of electronic commerce on business-level strategies," Journal of Electronic Commerce Research, Vol 1, No. 1:13-22, 2000.
-
(2000)
Journal of Electronic Commerce Research
, vol.1
, Issue.1
, pp. 13-22
-
-
Fruhling, A.L.1
Digman, L.A.2
-
15
-
-
79953657305
-
Understanding Cloud Computing Vulnerabilities Security & Privacy
-
Grobauer, B., T. Walloschek, and. E. Stocker, "Understanding Cloud Computing Vulnerabilities Security & Privacy," IEEE, Vol. 9, No. 2:50-57, 2011.
-
(2011)
IEEE
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
16
-
-
52949087178
-
Compute and storage clouds using wide area high performance networks
-
Grossman, R. L., Y.H. Gu, M. Sabala, and W.Z. Zhang, "Compute and storage clouds using wide area high performance networks," Future Generation Computer Systems, Vol. 25, No. 2:179-183, 2009.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.2
, pp. 179-183
-
-
Grossman, R.L.1
Gu, Y.H.2
Sabala, M.3
Zhang, W.Z.4
-
17
-
-
79951897344
-
Service-Oriented Architecture: Myths, Realities, and a Maturity Model
-
Hirschheim, R., R. Welke, and A. Schwarz, "Service-Oriented Architecture: Myths, Realities, and a Maturity Model," MIS Quarterly, Vol. 9, No. 1:37-48, 2010.
-
(2010)
MIS Quarterly
, vol.9
, Issue.1
, pp. 37-48
-
-
Hirschheim, R.1
Welke, R.2
Schwarz, A.3
-
18
-
-
14844363625
-
Service-oriented computing: key concepts and principles
-
Huhns, M. N., and M.P. Singh, "Service-oriented computing: key concepts and principles," Internet Computing, IEEE, Vol. 9, No. 1:75-81, 2005.
-
(2005)
Internet Computing, IEEE
, vol.9
, Issue.1
, pp. 75-81
-
-
Huhns, M.N.1
Singh, M.P.2
-
19
-
-
84893806688
-
IBM and Juniper Networks Solutions Brief
-
IBM. IBM and Juniper Networks: Delivering Solutions That Transform Your Networking Infrastructure, Retrieved Sep 21, 2011
-
IBM "IBM and Juniper Networks Solutions Brief. IBM Global Services. 2009. IBM and Juniper Networks: Delivering Solutions That Transform Your Networking Infrastructure," Retrieved Sep 21, 2011, from ftp://public.dhe.ibm.com/common/ssi/ecm/en/jns03002usen/JNS03002USEN.PDF, 2009.
-
(2009)
IBM Global Services. 2009
-
-
-
20
-
-
79952945712
-
Preparing for the future: understanding the seven capabilities of cloud computing
-
Iyer, B., and J.C. Henderson, "Preparing for the future: understanding the seven capabilities of cloud computing," MIS Quarterly Executive, Vol. 9, No. 2:117-131, 2010.
-
(2010)
MIS Quarterly Executive
, vol.9
, Issue.2
, pp. 117-131
-
-
Iyer, B.1
Henderson, J.C.2
-
21
-
-
70349309706
-
Data Security in the World of Cloud Computing
-
Kaufman, L. M., "Data Security in the World of Cloud Computing," IEEE Security & Privacy, Vol. 7, No. 4:61-64,2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
22
-
-
77958182649
-
Social Semantic Cloud of Tag: Semantic Model of Social Tagging
-
Kim, H. L., J.G. Breslin, S.K. Yang, and H.G. Kim, "Social Semantic Cloud of Tag: Semantic Model of Social Tagging," Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications, 2008.
-
(2008)
Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
-
-
Kim, H.L.1
Breslin, J.G.2
Yang, S.K.3
Kim, H.G.4
-
23
-
-
78951488046
-
A Peer-to-Peer Based Cloud Workflow System
-
Liu, X., D. Yuan, G. Zhand, J. Chen, and Y. Yang, A Peer-to-Peer Based Cloud Workflow System. Handbook of Cloud Computing, Vol. 2, pp. 309-332, 2010.
-
(2010)
Handbook of Cloud Computing
, vol.2
, pp. 309-332
-
-
Liu, X.1
Yuan, D.2
Zhand, G.3
Chen, J.4
Yang, Y.5
-
24
-
-
80054948421
-
Understanding the determinants of cloud computing adoption
-
Low, C., Y. Chen, and M. Wu, "Understanding the determinants of cloud computing adoption," Industrial Management & Data Systems, Vol. 111, No. 7:1006-1023, 2011.
-
(2011)
Industrial Management & Data Systems
, vol.111
, Issue.7
, pp. 1006-1023
-
-
Low, C.1
Chen, Y.2
Wu, M.3
-
26
-
-
79955535685
-
Combining Business Intelligence with Cloud Computing to deliver agility in actual economy
-
Mircea, M., B. Ghilic, and M. Stoica, "Combining Business Intelligence with Cloud Computing to deliver agility in actual economy," Journal of Economic Computation and Economic Cybernetics Studies, Vol. 45, No. 1:39-54, 2011.
-
(2011)
Journal of Economic Computation and Economic Cybernetics Studies
, vol.45
, Issue.1
, pp. 39-54
-
-
Mircea, M.1
Ghilic, B.2
Stoica, M.3
-
27
-
-
78651374724
-
Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding return on investment
-
Misra, S. C., and A. Mondal, "Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding return on investment," Mathematical and Computer Modelling, Vol. 53, 504-521, 2010.
-
(2010)
Mathematical and Computer Modelling
, vol.53
, pp. 504-521
-
-
Misra, S.C.1
Mondal, A.2
-
29
-
-
84893768630
-
-
Retrieved Sep 21, 2011
-
Nusca, A., "T-Mobile Sidekick data outage tests mettle of 800,000 customers," Retrieved Sep 21, 2011, from http://www.zdnet.com/blog/gadgetreviews/t-mobile-sidekick-data-outage-tests-mettle-of-800000-customers-carrier/8306, 2009.
-
(2009)
T-Mobile Sidekick data outage tests mettle of 800,000 customers
-
-
Nusca, A.1
-
30
-
-
70749140564
-
Formalising Service-Oriented Design
-
Perepletchikov, M., "Formalising Service-Oriented Design," Journal of software, Vol. 3, No. 2:1-10, 2008.
-
(2008)
Journal of software
, vol.3
, Issue.2
, pp. 1-10
-
-
Perepletchikov, M.1
-
31
-
-
65949097260
-
Cybercrime 2.0: when the cloud turns dark
-
Provos, N., M.A. Rajab, P. Mavrommatis, "Cybercrime 2.0: when the cloud turns dark," Communications of the ACM, Vol 52, No.4, 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.4
-
-
Provos, N.1
Rajab, M.A.2
Mavrommatis, P.3
-
32
-
-
77957706827
-
Effective use of cloud computing in educational institutions
-
Tuncay, E., "Effective use of cloud computing in educational institutions," Proscenia Social and Behavioral Sciences, Vol. 2, 938-942, 2010.
-
(2010)
Proscenia Social and Behavioral Sciences
, vol.2
, pp. 938-942
-
-
Tuncay, E.1
-
33
-
-
77957963021
-
Head in the Clouds-The Power of Infrastructure as a Service
-
presented at the meeting of the Workshop on Cloud Computing and in Applications
-
Vogels, W. A., "Head in the Clouds-The Power of Infrastructure as a Service" presented at the meeting of the Workshop on Cloud Computing and in Applications, 2008.
-
(2008)
-
-
Vogels, W.A.1
-
35
-
-
84855260942
-
A market-oriented hierarchical scheduling strategy in cloud workflow systems
-
Wu, Z., X. Liu, Z. Ni, D. Yuan, and Y. Yang, "A market-oriented hierarchical scheduling strategy in cloud workflow systems," The Journal of Supercomputing, Vol. 10, 2010.
-
(2010)
The Journal of Supercomputing
, vol.10
-
-
Wu, Z.1
Liu, X.2
Ni, Z.3
Yuan, D.4
Yang, Y.5
-
37
-
-
35448994590
-
Does electronic business create value for firms? An organizational innovation perspective
-
Zhuang, Y., "Does electronic business create value for firms? An organizational innovation perspective," Journal of Electronic Commerce Research, Vol. 6, No. 2:146:159, 2005.
-
(2005)
Journal of Electronic Commerce Research
, vol.6
, Issue.2
, pp. 146-159
-
-
Zhuang, Y.1
|