SSAP: Augmentation based Secure Storage Authentication and Privacy System in Cloud Environment
Author(s): T Prasath | N Aravindhu | D Rampriya
Volume: 2
Issue: 3
Year: 2013




Security Model for Microsoft Based Mobile Sales Management Application in Private Cloud Computing
Author(s): Kuan Chee Houng | Bharanidharan Shanmugam | Ganthan Narayana Samy | Sameer Hasan Albakri | Azuan Ahmad
Volume: 2
Issue: 3
Year: 2013




The concept of Cloud Computing Services For the application of e-health Education
Author(s): Wiwin - Suwarningsih
Volume: 2
Issue: 3
Year: 2013




Cloud Immunization and Security for e-Governance Applications
Author(s): Rama Krushna Das | Manas Ranjan Patra | Ajita Kumar Misro
Volume: 2
Issue: 3
Year: 2013




Optimization of QoS parameters through flexible Resource Scheduling in Finite Population Cloud Environment
Author(s): Veena Goswami
Volume: 2
Issue: 3
Year: 2013




A Review of Trust Aspects in Cloud Computing Security
Author(s): Azeem Sarwar | Muhammad Naeem Khan
Volume: 2
Issue: 2
Year: 2013




Scalable Multi-Tenant Authorization in Highly-Collaborative Cloud Applications
Author(s): Samy Gerges | Sherif Khattab | Hesham Hassan | Fatma A Omara
Volume: 2
Issue: 2
Year: 2013




Architecture & Design of Affordable and Highly Available Enterprise Cloud Service
Author(s): Rabi Prasad Padhy | Manas Ranjan Patra
Volume: 2
Issue: 2
Year: 2013




A Distributed Service and Business Model for Providing Cloud Computing Service
Author(s): Shreya Bhadra | Tirthankar Gayen
Volume: 2
Issue: 2
Year: 2013




Cloud Computing : Research Issues and Implications
Author(s): Marupaka Rajenda Prasad | R. Lakshman Naik | V. Bapuji
Volume: 2
Issue: 2
Year: 2013




Factors Influencing Organization Adoption Decision On Cloud Computing
Author(s): Ailar Rahimli
Volume: 2
Issue: 2
Year: 2013




Advance Billing and Metering Architecture for Infrastructure as a Service
Author(s): Sukhpal Singh | Inderveer Chana
Volume: 2
Issue: 2
Year: 2013




BFTDT: Byzantine Fault Tolerance tryout for Dependable Transactions in Cloud
Author(s): Gayathri S | Prasath T | Jamuna P
Volume: 2
Issue: 1
Year: 2012




Object-Relational Mapping Framework to Enable Multi-Tenancy Attributes in SaaS Applications
Author(s): Muhammad Naeem Khan | Arsalan Shahid
Volume: 2
Issue: 1
Year: 2012




Cloud Computing with Related Enabling Technologies
Author(s): Abah Joshua | Francisca Ogwueleka
Volume: 2
Issue: 1
Year: 2012




Cloud Based Development Issues: A Methodical Analysis
Author(s): Sukhpal Singh | Inderveer Chana
Volume: 2
Issue: 1
Year: 2012




Fully Homomorphic Encryption, Approximate Lattice Problem and LWE
Author(s): Gu Chunsheng
Volume: 2
Issue: 1
Year: 2012




Content-centric Information Protection in Cloud Computing
Author(s): Christopher Charles Lamb | Gregory L. Heileman
Volume: 2
Issue: 1
Year: 2012




Development and Usage of Software as a Service for a Cloud and Non-Cloud Based Environment- An Empirical Study
Author(s): Pratiyush Guleria Guleria | Vikas Sharma | Manish Arora
Volume: 2
Issue: 1
Year: 2012




Big Data Processing with Hadoop-MapReduce in Cloud Systems
Author(s): Rabi Prasad Padhy
Volume: 2
Issue: 1
Year: 2012




The Design and Implementation of the VMD Plugin for NAMD Simulations on the Amazon Cloud
Author(s): Adam Kai Leung Wong | Andrzej M. Goscinski
Volume: 1
Issue: 4
Year: 2012




Is cloud computing finally beginning to mature?
Author(s): Dimitrios Zissis | Dimitrios Lekkas
Volume: 1
Issue: 4
Year: 2012




Towards Information Security Metrics Framework for Cloud Computing
Author(s): Muhammad Imran Tariq
Volume: 1
Issue: 4
Year: 2012




Enterprise Architecture Frameworks and Services for Cloud Computing
Author(s): P Deivendran | E.R Naganathan
Volume: 1
Issue: 4
Year: 2012




Evolution of Cloud Computing and Enabling Technologies
Author(s): Rabi Prasad Padhy | Manas Ranjan Patra
Volume: 1
Issue: 4
Year: 2012




A Study on Security Threats in Cloud
Author(s): Na Jeyanthi | Hena Shabeeb | N.Ch.S.N. Iyengar
Volume: 1
Issue: 3
Year: 2012




Cloud Libraries: A Novel Application of Cloud Computing
Author(s): Faiz Abidi | Hasan Abidi
Volume: 1
Issue: 3
Year: 2012




An Enterprise Cloud Model for Optimizing IT Infrastructure
Author(s): Rabi Prasad Padhy | Manas Ranjan Patra
Volume: 1
Issue: 3
Year: 2012




Conceptualizing a Secure Wireless Cloud
Author(s): Tyson Brooks | Jerry Robinson | Lee McKnight
Volume: 1
Issue: 3
Year: 2012




CREW: A Cloud based Revenue model for Rural Entrepreneurial Women in India
Author(s): Hannah Monisha .J | Rhymend Uthariaraj .V
Volume: 1
Issue: 3
Year: 2012




Building trust into cloud
Author(s): Wenjuan FAN | Shanlin YANG | Jun PEI | He Luo
Volume: 1
Issue: 3
Year: 2012




Virtual Business Collaboration Conceptual Knowledge Model (VBCKM)
Author(s): Morcous Massoud Yassa | Fatama A Omara | Hesham A Hassan
Volume: 1
Issue: 3
Year: 2012




Regenerating Cloud Attack Scenarios using LVM2 based System Snapshots for Forensic Analysis
Author(s): G. Geethakumari | Abha Belorkar
Volume: 1
Issue: 3
Year: 2012




Minimization of Delay for Query Processing in Peer to Peer Networks
Author(s): U.V. Arivazhagu | S. Srinivasan
Volume: 1
Issue: 2
Year: 2012




Efficient Architectural Framework for Cloud Computing
Author(s): Souvik Pal | Prasant Kumar Pattnaik
Volume: 1
Issue: 2
Year: 2012




A Novel Open Security Framework for Cloud Computing
Author(s): Devki Gaurav Pal
Volume: 1
Issue: 2
Year: 2012




The Future of Web and Mobile Game Development
Author(s): Kevin Curran | Ciaran George
Volume: 1
Issue: 1
Year: 2012




New Federated Collaborative Networked Organization Model (FCNOM)
Author(s): Morcous M. Yassa | Hesham A. Hassan | Fatma A. Omara
Volume: 1
Issue: 1
Year: 2012




An approach to identify the optimal cloud in cloud federation
Author(s): Saumitra Baleshwar Govil | Karthik Thyagarajan | Karthikeyan Srinivasan | Vijay Kumar Chaurasiya | Santanu Das
Volume: 1
Issue: 1
Year: 2012




Multi-source Information Service Process Management in Cloud Computing Environment
Author(s): Wenjuan Fan | Shanlin Yang
Volume: 1
Issue: 1
Year: 2012



