-
1
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
Y. Tang, P. P. Lee, J. Lui, and R. Perlman, "Secure overlay cloud storage with access control and assured deletion, " Dependable and Secure Computing, IEEE Transactions on, vol. 9, no. 6, pp. 903-916, 2012.
-
(2012)
Dependable and Secure Computing, IEEE Transactions on
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.P.2
Lui, J.3
Perlman, R.4
-
2
-
-
78650052308
-
An in-vm measuring framework for increasing virtual machine security in clouds
-
Q. Liu, C. Weng, M. Li, and Y. Luo, "An in-vm measuring framework for increasing virtual machine security in clouds, " Security & Privacy, IEEE, vol. 8, no. 6, pp. 56-62, 2010.
-
(2010)
Security & Privacy, IEEE
, vol.8
, Issue.6
, pp. 56-62
-
-
Liu, Q.1
Weng, C.2
Li, M.3
Luo, Y.4
-
5
-
-
84944030124
-
Deep packet inspection using parallel bloom filters
-
S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood, "Deep packet inspection using parallel bloom filters, " in High performance interconnects, 2003. proceedings. 11th symposium on. IEEE, 2003, pp. 44-51.
-
(2003)
High Performance Interconnects, 2003. Proceedings. 11th Symposium On. IEEE
, pp. 44-51
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.3
Lockwood, J.4
-
7
-
-
80053421848
-
Cloud computing and its key techniques
-
IEEE
-
S. Jie, J. Yao, and C. Wu, "Cloud computing and its key techniques, " in Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on, vol. 1. IEEE, 2011, pp. 320-324.
-
(2011)
Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on
, vol.1
, pp. 320-324
-
-
Jie, S.1
Yao, J.2
Wu, C.3
-
8
-
-
84899579202
-
Evaluating firewall models for hybrid clouds
-
H. Kurdi, M. Enazi, and A. Al Faries, "Evaluating firewall models for hybrid clouds, " in Modelling Symposium (EMS), 2013 European. IEEE, 2013, pp. 514-519.
-
(2013)
Modelling Symposium (EMS), 2013 European. IEEE
, pp. 514-519
-
-
Kurdi, H.1
Enazi, M.2
Al Faries, A.3
-
9
-
-
84923305355
-
Compatibility-aware cloud service composition under fuzzy preferences of users
-
A. V. Dastjerdi and R. Buyya, "Compatibility-aware cloud service composition under fuzzy preferences of users, " IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 1-13, 2014.
-
(2014)
IEEE Transactions on Cloud Computing
, vol.2
, Issue.1
, pp. 1-13
-
-
Dastjerdi, A.V.1
Buyya, R.2
-
10
-
-
84886164237
-
Proactive security mechanism and design for firewall
-
S.-U. Lar, X. Liao, A. ur Rehman, and M. Qinglu, "Proactive security mechanism and design for firewall, " Journal of Information Security, vol. 2, no. 03, p. 122, 2011.
-
(2011)
Journal of Information Security
, vol.2
, Issue.3
, pp. 122
-
-
Lar, S.-U.1
Liao, X.2
Ur Rehman, A.3
Qinglu, M.4
-
11
-
-
85010467940
-
-
Riverbed Modular accessed June 30
-
Riverbed Modular,(accessed June 30, 2016)[Online]. Available: http://www. riverbed. com/sg/
-
(2016)
-
-
-
12
-
-
84899822786
-
Cloud computing: Different approach & security challenge
-
M. Sharma, H. Bansal, and A. K. Sharma, "Cloud computing: Different approach & security challenge, " International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 1, pp. 421-424, 2012.
-
(2012)
International Journal of Soft Computing and Engineering (IJSCE)
, vol.2
, Issue.1
, pp. 421-424
-
-
Sharma, M.1
Bansal, H.2
Sharma, A.K.3
-
13
-
-
84899994469
-
Cloud computing basics
-
J. Srinivas, K. V. S. Reddy, and A. M. QYSER, "Cloud computing basics, " International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 5, 2012.
-
(2012)
International Journal of Advanced Research in Computer and Communication Engineering
, vol.1
, Issue.5
-
-
Srinivas, J.1
Reddy, K.V.S.2
Qyser, A.M.3
-
14
-
-
79952392071
-
Personal cloud computing security framework
-
S.-H. Na, J.-Y. Park, and E.-N. Huh, "Personal cloud computing security framework, " in Services Computing Conference (APSCC), 2010 IEEE Asia-Pacific. IEEE, 2010, pp. 671-675.
-
(2010)
Services Computing Conference (APSCC), 2010 IEEE Asia-Pacific. IEEE
, pp. 671-675
-
-
Na, S.-H.1
Park, J.-Y.2
Huh, E.-N.3
-
15
-
-
85010322147
-
-
accessed June 30
-
MATLAB Environment,(accessed June 30, 2016)[Online]. Available: http://www. mathworks. com/products/matlab/
-
(2016)
MATLAB Environment
-
-
-
16
-
-
84908332902
-
Execution analysis of load balancing algorithms in cloud computing environment
-
S. Ray and A. De Sarkar, "Execution analysis of load balancing algorithms in cloud computing environment, " International Journal on Cloud Computing: Services and Architecture (IJCCSA), vol. 2, no. 5, pp. 1-13, 2012.
-
(2012)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
, vol.2
, Issue.5
, pp. 1-13
-
-
Ray, S.1
De Sarkar, A.2
|