-
1
-
-
84855794485
-
Understanding the complexity surrounding multitenancy in cloud computing
-
K. Wood, M. Anderson, " Understanding the complexity surrounding multitenancy in cloud computing", 2011 Eighth IEEE International Conference on e-Business Engineering, Vol. 1, no. , 119-124, 2011.
-
(2011)
2011 Eighth IEEE International Conference on E-Business Engineering
, vol.1
, pp. 119-124
-
-
Wood, K.1
Anderson, M.2
-
2
-
-
84857523561
-
A Distributed Access Control Architecture for Cloud Computing
-
A. Abdulrahman, M. Sarfraz, et al, " A Distributed Access Control Architecture for Cloud Computing ," IEEE SOF T WARE, Vol. 12, no. , 36-44, 2012.
-
(2012)
IEEE Sof t ware
, vol.12
, pp. 36-44
-
-
Abdulrahman, A.1
Sarfraz, M.2
-
3
-
-
80055104480
-
C2EN: Anisotropic Model of Cloud Computing
-
1st Initial
-
Z. Chaczko, S. Aslanzadeh, 1st Initial, " C2EN: Anisotropic Model of Cloud Computing", 2011 21st International Conference on Systems Engineering, Vol. 11, no. , 467-473, 2011
-
(2011)
2011 21st International Conference on Systems Engineering
, vol.11
, pp. 467-473
-
-
Chaczko, Z.1
Aslanzadeh, S.2
-
4
-
-
78149310420
-
A trusted computing environment model in cloud architecture
-
X. Li, L. Zhou, et al, " A TRUSTED COMPUTING ENVIRONMENT MODEL IN CLOUD ARCHITECTURE", Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, Vol. 9, no. , 2843-2848, 2010.
-
(2010)
Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao
, vol.9
, pp. 2843-2848
-
-
Li, X.1
Zhou, L.2
-
5
-
-
84856173468
-
Shrew Attack in Cloud Data Center Networks
-
Z. Feng, B. Bai, et al, " Shrew Attack in Cloud Data Center Networks", 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks, Vol. 11, no. , 441-445, 2011.
-
(2011)
2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks
, vol.11
, pp. 441-445
-
-
Feng, Z.1
Bai, B.2
-
6
-
-
79955709135
-
Role-Based Access-Control Using Reference Ontology in Clouds
-
W. Tsai, Q. Shao, " Role-Based Access-Control Using Reference Ontology in Clouds", 2011 Tenth International Symposium on Autonomous Decentralized Systems, Vol. 11, no. 121-128, 2011
-
(2011)
2011 Tenth International Symposium on Autonomous Decentralized Systems
, vol.11
, Issue.121-128
-
-
Tsai, W.1
Shao, Q.2
-
7
-
-
80054985914
-
A Combined Workload Planning Approach for Multi-Tenant Business Applications
-
C. Momm, W. Theilmann, " A Combined Workload Planning Approach for Multi-Tenant Business Applications", 2011 35th IEEE Annual Computer Software and Applications Conference Workshops, Vol. 11, no. , 255-260, 2011.
-
(2011)
2011 35th IEEE Annual Computer Software and Applications Conference Workshops
, vol.11
, pp. 255-260
-
-
Momm, C.1
Theilmann, W.2
-
8
-
-
84857964182
-
Are Your Papers in Order? Developing and Enforcing Multi-Tenancy and Migration Policies in the Cloud
-
B. Hay, K. Nance, et al, "Are Your Papers in Order? Developing and Enforcing Multi-Tenancy and Migration Policies in the Cloud", 2012 45th Hawaii International Conference on System Sciences , Vol. 12, no. , 5473- 5479, 2012.
-
(2012)
2012 45th Hawaii International Conference on System Sciences
, vol.12
, pp. 5473-5479
-
-
Hay, B.1
Nance, K.2
|