-
3
-
-
83755178020
-
An overview of the security concerns in enterprise cloud computing
-
Jan
-
Anthony Bisong&Sayed. M. Rahman, "An Overview Of The Security Concerns In Enterprise Cloud Computing," IJNSA, Vol. 3, No. 1, Jan 20 11.
-
(2011)
IJNSA
, vol.3
, Issue.1
-
-
Bisong, A.1
Rahman, S.M.2
-
4
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
copublished by The IEEE Computer and Reliability Societies, Marchi April
-
Bernd Grobauer, Tobias Walloschek and Elmar Stocker, "Understanding Cloud Computing Vulnerabilities," A white paper by SIEMENS, copublished by The IEEE Computer and Reliability Societies, Marchi April 2011.
-
(2011)
A White Paper by SIEMENS
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
7
-
-
77954051808
-
-
National institute of Science and technology, Retrieved July 24
-
National institute of Science and technology, "the NIST Definition of Cloud Computing," p. 7, Retrieved July 24 2011.
-
(2011)
The NIST Definition of Cloud Computing
, pp. 7
-
-
-
8
-
-
84880889223
-
An analysis of the cloud computing security problem
-
Sydney, Australia, 30th Nov
-
Mohamed AI Morsy, John Grundy and Ingo MUlier, "An Analysis of The Cloud Computing Security Problem," In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010.
-
(2010)
Proceedings of APSEC 2010 Cloud Workshop
-
-
Morsy, M.A.I.1
Grundy, J.2
Mulier, I.3
-
9
-
-
84890331951
-
Secure cloud by it auditing
-
issn: 2249-6645
-
ChipurupalliSekhar, U. Nanaji, "Secure Cloud By It Auditing," International Journal Of Modern Engineering Research (IJMER) www. ijmer. com vol. I, Issue. 2, pp-332-337 issn: 2249-6645.
-
International Journal of Modern Engineering Research (IJMER)
, vol.1
, Issue.2
, pp. 332-337
-
-
Sekhar, C.1
Nanaji, U.2
-
10
-
-
80051911580
-
The cloudy future of government It: Cloud computing and the public sector around the world
-
January
-
David C. Wyld, "The Cloudy Future of Government It: Cloud Computing and the Public Sector Around The World," International Journal of Web & Semantic Technology (IJWesT), Vol 1, Num 1, January 2010.
-
(2010)
International Journal of Web & Semantic Technology (IJWesT)
, vol.1
, Issue.1
-
-
Wyld, D.C.1
-
11
-
-
69949171348
-
Cloud computing and information policy:Computing in a policy cloud
-
Paul T. Jaeger, Jimmy Lin & Justin M. Grimes (2008): Cloud Computing and Information Policy:Computing in a Policy Cloud?," Journal of Information Technology & Politics, 5:3, 269-283.
-
(2008)
Journal of Information Technology & Politics
, vol.5
, Issue.3
, pp. 269-283
-
-
Jaeger, P.T.1
Lin, J.2
Grimes, J.M.3
-
12
-
-
79955523308
-
Exploiting dynamic resource allocation forefficient parallel data processing in the cloud
-
January
-
Daniel Warneke and Odej Kao, "Exploiting Dynamic Resource Allocation forEfficient Parallel Data Processing in the Cloud," IEEE Transactions On Parallel And Distributed Systems, January 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
-
-
Warneke, D.1
Kao, O.2
-
13
-
-
77955666390
-
Energy-efficient cloud computing
-
Andreas Berll, ErolGelenbe, Marco di Girolamo, Giovanni Giuliani, Hermann de Meerl, Minh Quan Dang and Kostas Pentikousis, "Energy-Efficient Cloud Computing," The Computer Journal, Vol. 53 No. 7, 2010.
-
(2010)
The Computer Journal
, vol.53
, Issue.7
-
-
Berll, A.1
Erolgelenbe, D.G.M.2
Giuliani, G.3
De Meerl, H.4
Quan Dang, M.5
Pentikousis, K.6
-
14
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Qian Wang, Cong Wang, KuiRen, Wenjing Lou, and lin Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," Presented at The 14th EuropeanSymposium on Research in Computer Security (ESORICS'09).
-
Presented at the 14th EuropeanSymposium on Research in Computer Security (ESORICS'09)
-
-
Wang, Q.1
Wang, C.2
Kuiren, L.W.3
Li, L.4
-
15
-
-
84864774329
-
A hybrid approach to private record matching fellow
-
September/October
-
Ali Inan, Gabriel Ghinita, Murat Kantarcioglu, and Elisa Bertino, "A Hybrid Approach to Private Record Matching Fellow," IEEE Transactions On Dependable And Secure Computing, Vol. 9, No. 5, September/October 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.5
-
-
Inan, A.1
Ghinita, G.2
Kantarcioglu, M.3
Bertino, E.4
-
16
-
-
79960900327
-
A privacypreserving remote data integrity checking protocol with data dynamics and public verifiability
-
IEEE
-
ZhuoHao, Sheng Zhong, and Nenghai Yu, "A PrivacyPreserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability," IEEE Transactions On Knowledge And Data Engineering, 2011 IEEE.
-
(2011)
IEEE Transactions on Knowledge and Data Engineering
-
-
Zhuohao, Z.S.1
Yu, N.2
-
17
-
-
79960915041
-
Optimal service pricing for a cloud cache
-
IEEE. Website references,www. saleforce. com, www. ibm. com, www. sun. com
-
VerenaKantere, Debabrata Dash, Gregory Francois, Sofia Kyriakopoulou and Anastasia Ailamaki, "Optimal service pricing for a cloud cache," IEEE Transactions on Knowledge and Data Engineering, 2011 IEEE. Website references, www. wikipedia. com. www. saleforce. com, www. ibm. com, www. sun. com
-
(2011)
IEEE Transactions on Knowledge and Data Engineering
-
-
Verenakantere, D.D.1
Francois, G.2
Kyriakopoulou, S.3
Ailamaki, A.4
-
18
-
-
84890412239
-
-
Amazon EC2 and S3
-
Amazon EC2 and S3, online at http://aws. amazon. coml
-
-
-
-
19
-
-
84890399971
-
-
Google App Engine
-
Google App Engine, Online at: http://code. google. comlappengine/
-
-
-
-
21
-
-
63049100876
-
Neural network based efficient knowledge discovery in hospital databases using RFID Technology
-
19-21 Nov.
-
Nalinipriya. G, Anandhakumar. P, "Neural Network Based Efficient Knowledge Discovery In Hospital Databases Using RFID Technology", TENCON 2008, IEEE Region 10 Conference, pp: 1-6, 19-21 Nov. 2008.
-
(2008)
TENCON 2008, IEEE Region 10 Conference
, pp. 1-6
-
-
Nalinipriy, A.G.1
Anandhakumar, P.2
|