A Survey on Cloud Computing
暂无分享,去创建一个
[1] Harpreet Kaur,et al. Cloud Computing Security: Issues and Concerns , 2013 .
[2] Susanne Patig,et al. Cloud Computing Providers: Characteristics and Recommendations , 2011, MCETECH.
[3] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[4] Rajkumar Buyya,et al. Service and Utility Oriented Distributed Computing Systems: Challenges and Opportunities for Modeling and Simulation Communities , 2008, Annual Simulation Symposium.
[5] Gene H. Golub,et al. Scientific computing: an introduction with parallel computing , 1993 .
[6] Shufen Zhang,et al. The comparison between cloud computing and grid computing , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[7] Sumit Khurana,et al. Comparison of Cloud Computing Service Models: SaaS, PaaS, IaaS , 2013 .
[8] Gerard Conway,et al. Managing Cloud Computing - A Life Cycle Approach , 2012, CLOSER.
[9] Wenhong Tian,et al. An Introduction to Cloud Computing , 2015 .
[10] Bo Ai,et al. The issues of cloud computing security in high-speed railway , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[11] Jeffrey M. Voas,et al. Cloud Computing , 2013, IT Prof..
[12] Shufen Zhang,et al. Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.
[13] Won Kim,et al. Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..
[14] Mladen A. Vouk,et al. Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.
[15] Richard Branch,et al. Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives , 2014 .
[16] Lee Gillam,et al. Cloud Computing, Principles, Systems and Applications , 2010, Cloud Computing.
[17] Regina Frei,et al. Self-healing and self-repairing technologies , 2013 .
[18] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[19] Derrick Rountree,et al. The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice , 2013 .
[20] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[21] Mohit Sharma,et al. Cloud computing and its security issues — A review , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[22] Sherif Sakr,et al. Cloud Data Management , 2014, Springer International Publishing.
[23] César A. F. De Rose,et al. Performance Evaluation of Container-Based Virtualization for High Performance Computing Environments , 2013, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.
[24] Michael Miller,et al. Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online , 2008 .
[25] Rajesh Kumar Tiwari,et al. A Comprehensive Study on Cloud Computing , 2012 .
[26] R. Buyya,et al. Green Cloud Computing and Environmental Sustainability , 2012 .
[27] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[28] Amit Goyal,et al. A Survey on Cloud Computing , 2009 .
[29] Shubhashis Sengupta,et al. Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.
[30] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[31] Muli Ben-Yehuda,et al. The rise of RaaS: the resource-as-a-service cloud , 2014, CACM.
[32] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[33] Quanyan Zhu,et al. Dynamic Service Placement in Geographically Distributed Clouds , 2012, IEEE Journal on Selected Areas in Communications.
[34] Michael J. Kavis,et al. Architecting the Cloud: Design Decisions for Cloud Computing Service Models (Saas, Paas, and Iaas) , 2014 .
[35] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[36] Rubén S. Montero,et al. Key Challenges in Cloud Computing: Enabling the Future Internet of Services , 2013, IEEE Internet Computing.
[37] Shang Juan Ye,et al. Research on MPI Based on Cloud Computing , 2013 .
[38] Kirit J. Modi,et al. Cloud computing - concepts, architecture and challenges , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[39] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[40] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[41] Arunima Jaiswal,et al. Virtualization in Cloud Computing , 2014 .
[42] Naidila Sadashiv,et al. Cluster, grid and cloud computing: A detailed comparison , 2011, 2011 6th International Conference on Computer Science & Education (ICCSE).
[43] Raj Jain,et al. Network virtualization and software defined networking for cloud computing: a survey , 2013, IEEE Communications Magazine.
[44] Michael Kavis,et al. Architecting The Cloud: KAVIS: ARCHITECTING THE CLOUD , 2014 .
[45] Yadong Gong,et al. A Survey of Cloud Computing , 2013 .
[46] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[47] Rajkumar Buyya,et al. NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.
[48] Vijay Varadharajan,et al. Security as a Service Model for Cloud Environment , 2014, IEEE Transactions on Network and Service Management.
[49] Martin Molina,et al. A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures , 2013, Future Gener. Comput. Syst..
[50] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.