A Study on Cloud Computing: A Review
暂无分享,去创建一个
Pooja Mittal | Tabish Mufti | Swati R. Maurya | Deepak Kumar | Swati Maurya | Rupam Gupta | Pooja Mittal | Tabish Mufti | Deepak Kumar | Rupam Gupta
[1] Divya Chaudhary,et al. Cost optimized Hybrid Genetic-Gravitational Search Algorithm for load scheduling in Cloud Computing , 2019, Appl. Soft Comput..
[2] Henryk Modzelewski,et al. On Producing Reliable and Affordable Numerical Weather Forecasts on Public Cloud-Computing Infrastructure , 2019, Journal of Atmospheric and Oceanic Technology.
[3] Nanlin Jin,et al. Cloud computing deployment: a cost-modelling case-study , 2018, Wireless Networks.
[4] Xuan Wang,et al. Fast Time Series Discords Detection with Privacy Preserving , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[5] Santanu Phadikar,et al. Multi-objective optimization technique for resource allocation and task scheduling in vehicular cloud architecture: A hybrid adaptive nature inspired approach , 2018, J. Netw. Comput. Appl..
[6] Diao Zhe,et al. Study on Data Security Policy Based on Cloud Storage , 2017, 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).
[7] Lajanugen Logeswaran,et al. Performance, Resource, and Cost Aware Resource Provisioning in the Cloud , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).
[8] Suresh Pabboju,et al. Data security in cloud computing and outsourced databases , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[9] Mukesh Singhal,et al. A cloud-based web crawler architecture , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[10] Mukesh Singhal,et al. A Light-Weight Permutation Based Method for Data Privacy in Mobile Cloud Computing , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[11] Mehdi Bahrami,et al. Cloud Template, a Big Data Solution , 2013, ArXiv.
[12] Mohammed El Ghazi,et al. Cloud computing: Security challenges , 2012, 2012 Colloquium in Information Science and Technology.
[13] Xiaoli Liu,et al. Cloud architecture learning based on social architecture , 2012, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT).
[14] A. Behl,et al. An analysis of cloud computing security issues , 2012, 2012 World Congress on Information and Communication Technologies.
[15] Xiaoyuan Yang,et al. Improved verifiability scheme for data storage in cloud computing , 2011, Wuhan University Journal of Natural Sciences.
[16] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[17] Muli Ben-Yehuda,et al. The Reservoir model and architecture for open federated cloud computing , 2009, IBM J. Res. Dev..
[18] Markus Klems,et al. Do Clouds Compute? A Framework for Estimating the Value of Cloud Computing , 2008, WEB.
[19] Aferdita Ibrahimi,et al. Cloud Computing: Pricing Model , 2017 .
[20] S. Jayashri,et al. Efficient privacy preserving integrity checking model for cloud data storage security , 2017, 2016 Eighth International Conference on Advanced Computing (ICoAC).
[21] Sanjay Kumar,et al. Ensuring data storage security in cloud computing based on hybrid encryption schemes , 2016, 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).
[22] Mehmet Sahinoglu,et al. CLOUD Computing: Cost-effective Risk Management with Additional Product Deployment , 2015, SCSE.
[23] Mukesh Singhal,et al. The Role of Cloud Computing Architecture in Big Data , 2015 .
[24] Dan C. Marinescu,et al. Cloud Resource Management and Scheduling , 2013 .
[25] Sumitra Binu,et al. A SECURITY FRAMEWORK FOR AN ENTERPRISE SYSTEM ON CLOUD , 2012 .
[26] Zhang Min,et al. Study on Cloud Computing Security , 2011 .