Elucidating the Robust and Resilient Cloud Security Solution Approaches

[1]  Fengju Kang,et al.  Cloud Simulation Resource Scheduling Algorithm Based on Multi-dimension Quality of Service , 2012 .

[2]  Bo Ding,et al.  A Cloud-Based Collaborative Manufacturing Resource Sharing Services , 2012 .

[3]  Rusli Abdullah,et al.  Security Facilitation in Collaborative Cloud Data Storage Implementation Environment Based on Multi Agent System Architecture , 2012 .

[4]  Yingjie Xia,et al.  A Hierarchical Access Control Scheme in Cloud using HHECC , 2010 .

[5]  Yu Dingguo,et al.  Research on Trust Cloud-based Subjective Trust Management Model under Open Network Environment , 2011 .

[6]  Elijah Blessing Rajsingh,et al.  Efficient Service Selection Middleware using ELECTRE Methodology for Cloud Environments , 2012 .

[7]  Hao Yuan,et al.  Resource Scheduling of Cloud Computing for Node of Wireless Sensor Network Based on Ant Colony Algorithm , 2012 .

[8]  Rusli Abdullah,et al.  Multi Agent System Architecture Oriented Prometheus Methodology Design to Facilitate Security of Cloud Data Storage , 2011 .

[9]  Dongqing Xie,et al.  A High-capacity Steganographic Scheme for 3D Point Cloud Models , 2010 .

[10]  Zetao Jiang,et al.  A New Rapid Triangulation Method of Space Closed Point Cloud , 2011 .

[11]  Isabella M. Venter,et al.  Grid Security: Evaluation of Active and Passive Attacks with Proposed Countermeasures , 2011 .

[12]  Ademola P. Abidoye,et al.  A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment , 2012 .

[13]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..