Asian Journal of Information Technology
Year:
2015
Volume:
14
Issue:
6
Page No.
231 - 238
References
Frincu, M.E., 2014. Scheduling highly available applications on cloud environments. Future Gener. Comput. Syst., 32: 138-153.
CrossRef | Kshetri, N., 2012. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommuni. Policy,
Membrey, P., D. Hows and F. Plugge, 2012. Load Balancing in the Cloud. In: Practical Load Balancing. Membrey, P., D. Hows and E. Plugge (Eds.). Apress, New York, USA., ISBN: 978-1-4302-3680-1, pp: 211-224.
Monikandan, S. and L. Arockiam, 2015. Confidentiality technique to enhance security of data in public cloud storage using data obfuscation. Indian J. Sci. Technol., Vol. 8. 10.17485/ijst/2015/v8i24/80162
Nyre, A.A. and M.G. Jaatun, 2010. A probabilistic approach to information control. J. Internet Technol., 11: 407-416.
Direct Link | Rebollo, O., D. Mellado, E. Fernandez-Medina and H. Mouratidis, 2015. Empirical evaluation of a cloud computing information security governance framework. Inf. Software Technol., 58: 44-57.
CrossRef | Shahzad, F., 2014. State-of-the-art survey on cloud computing security challenges, approaches and solutions. Procedia Comput. Sci., 37: 357-362.
CrossRef |