Research Journal of Applied Sciences
Year:
2014
Volume:
9
Issue:
9
Page No.
614 - 618
References
Ahmed, M., A.S.R. Chowdhury, M. Ahmed and M.H. Rafee, 2012. An advanced survey on cloud computing and state-of-the-art research issues. Int. J. Comput. Sci. Issues, 9: 201-207.
Direct Link | Almorsy, M., J. Grundy and A.S. Ibrahim, 2011. Collaboration-based cloud computing security management framework. Proceedings of the 4th IEEE International Conference on Cloud Computing, July 4-9, 2011, Washington, DC., pp: 364-371.
Bilgaiyan, S., S. Sagnika and M. Das, 2014. An analysis of task scheduling in cloud computing using evolutionary and swarm-based algorithms. Int. J. Comput. Appl., 89: 11-18.
CrossRef | Direct Link | Bilgaiyan, S., S. Sagnika and M. Das, 2014. Workflow scheduling in cloud computing environment using cat swarm optimization. Proceedings of the 4th IEEE International Advance Computing Conference, February 21-22, 2014, Gurgaon, India, pp: 680-685.
Bisong, A. and S.S.M. Rahman, 2011. An overview of the security concerns in enterprise cloud computing. Int. J. Network Secur. Applic., 3: 30-45.
CrossRef | Direct Link | Buyya, R., C.S. Yeo, S. Venugopal, J. Broberg and I. Brandic, 2009. Cloud computing and emerging IT platforms: Vision, hype and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst., 25: 599-616.
CrossRef | Direct Link | Chaisiri, S., B.S. Lee and D. Niyato, 2012. Optimization of resource provisioning cost in cloud computing. IEEE Trans. Serv. Comput., 5: 164-177.
CrossRef | Direct Link | Chen, D. and H. Zhao, 2012. Data security and privacy protection issues in cloud computing. Proceedings of the IEEE International Conference on Computer Science and Electronics Engineering, March 23-25, 2012, Hangzhou, China, pp: 647-651.
Garg, S.K., S. Versteeg and R. Buyya, 2013. A framework for ranking of cloud computing services. Future Gener. Comput. Syst., 29: 1012-1023.
CrossRef | Direct Link | Hamlen, K., M. Kantarcioglu, L. Khan and B. Thuraisingham, 2010. Security issues for cloud computing. Int. J. Inform. Secur. Privacy, 4: 39-51.
CrossRef | Direct Link | Hashizume, K., D.G. Rosado, E. Fernandez-Medina and E.B. Fernandez, 2013. An analysis of security issues for cloud computing. J. Internet Services Applic. 10.1186/1869-0238-4-5
Hu, J., J. Gu, G. Sun and T. Zhao, 2010. A scheduling strategy on load balancing of virtual machine resources in cloud computing environment. Proceedings of the 3rd International Symposium on Parallel Architectures, Algorithms and Programming, December 18-20, 2010, Dalian, China, pp: 89-96.
Jain, A. and U.S. Pandey, 2013. Role of cloud computing in higher education. Int. J. Adv. Res. Comput. Sci. Software Eng., 2: 966-972.
Direct Link | Jansen, W.A., 2011. Cloud hooks: Security and privacy issues in cloud computing. Proceedings of the 44th Hawaii International Conference on System Sciences, January 4-7, 2011, Koloa, Kauai, HI., USA., pp: 1-10.
Jorissen, K., F.D. Vila and J.J. Rehr, 2012. A high performance scientific cloud computing environment for materials simulations. Comput. Phys. Commun., 183: 1911-1919.
Direct Link | Kulkarni, G., R. Sutar and J. Gambhir, 2012. Cloud computing-infrastructure as service-amazon EC2. Int. J. Eng. Res. Appl., 2: 117-125.
Kumar, P. and S. Anand, 2013. An approach to optimize workflow scheduling for cloud computing environment. J. Theoret. Applied Inform. Technol., 57: 617-623.
Direct Link | Lee, K., 2012. Security threats in cloud computing environments. Int. J. Secur. Appl., 6: 25-32.
Direct Link | Pfeiffer, M., 2014. Implementing active directory domain services in the AWS cloud. Amazon Web Services, March 2014, pp: 1-23. https://d0.awsstatic.com/whitepapers/Implementing_Active_Directory_Domain_Services_in_the_AWS_Cloud.pdf.
Ramgovind, S., M.M. Eloff and E. Smith, 2010. The management of security in Cloud computing. Proceedings of the Information Security for South Africa, August 2-4, 2010, Sandton, Johannesburg, pp: 1-7.
Rimal, B.P., E. Choi and I. Lumb, 2009. A taxonomy and survey of cloud computing systems. Proceedings of the 5th International Joint Conference on INC, IMS and IDC, August 25-27, 2009, Seoul, South Korea, pp: 44-51.
Ristov, S., M. Gusev and M. Kostoska, 2012. Cloud computing security in business information systems. Int. J. Network Secur. Appl., 4: 75-93.
Direct Link | Sabahi, F., 2011. Cloud computing security threats and responses. Proceedings of the 3rd IEEE International Conference on Communication Software and Networks, May 27-29, 2011, Xian, China, pp: 245-249.
Tayal, S., 2011. Tasks scheduling optimization for the cloud computing system. Int. J. Innov. Eng. Technol., 5: 111-115.
Direct Link | Vouk, M.A., 2008. Cloud computing-issues, research and implementations. J. Comput. Inform. Technol., 16: 235-246.
Direct Link | Warneke, D. and O. Kao, 2011. Exploiting dynamic resource allocation for efficient parallel data processing in the cloud. IEEE Trans. Parallel Distrib. Syst., 22: 985-997.
CrossRef | Direct Link |