Nothing Special   »   [go: up one dir, main page]

skip to main content
SP 800-145. The NIST Definition of Cloud ComputingSeptember 2011
2011 Technical Report
Publisher:
  • National Institute of Standards & Technology
  • Gaithersburg
  • MD
  • United States
Published:01 September 2011
Reflects downloads up to 14 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.

Cited By

  1. Hussain A and Dawood B (2025). A survey on IoT-cloud task in healthcare system, The Journal of Supercomputing, 81:1, Online publication date: 1-Jan-2025.
  2. ACM
    Ji S, Tang Z, Wang W, Li H, Yao J and Jacobsen H Ripple: Large-Scale Service and Configuration Management in the Cloud Proceedings of the 25th International Middleware Conference, (354-366)
  3. Maroudis A, Theodoropoulos T, Violos J, Leivadeas A and Tserpes K (2024). Leveraging Graph Neural Networks for SLA Violation Prediction in Cloud Computing, IEEE Transactions on Network and Service Management, 21:1, (605-620), Online publication date: 1-Feb-2024.
  4. Alomari Z, AL-Oudat M and Alkhushayni S (2024). Pricing the cloud based on multi-attribute auction mechanism, Cluster Computing, 27:1, (629-654), Online publication date: 1-Feb-2024.
  5. ACM
    Khurram S, Sabau A, Lichter H and Tanachutiwat S Scenario-based synthetic traffic generation for web applications using workload patterns Proceedings of the 2024 6th Asia Pacific Information Technology Conference, (22-30)
  6. Maleki D, Mansouri A and Arianyan E (2023). An integrated taxonomy of standard indicators for ranking and selecting supercomputers, IET Computers & Digital Techniques, 17:3-4, (162-179), Online publication date: 27-Jul-2023.
  7. ACM
    Costa B, Bachiega J, de Carvalho L and Araujo A (2022). Orchestration in Fog Computing: A Comprehensive Survey, ACM Computing Surveys, 55:2, (1-34), Online publication date: 31-Mar-2023.
  8. ACM
    Wanner J, Wissuchek C, Welsch G and Janiesch C (2023). A Taxonomy and Archetypes of Business Analytics in Smart Manufacturing, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 54:1, (11-45), Online publication date: 7-Feb-2023.
  9. Koushik S. and Patil A (2022). An Approach to Ensure Secure Inter-Cloud Data and Application Migration Using End-to-End Encryption and Content Verification, International Journal of Ambient Computing and Intelligence, 13:1, (1-21), Online publication date: 23-Nov-2022.
  10. ACM
    Ohnishi K, Kotani D, Ichihara H, Kanemaru Y and Okabe Y Acila Proceedings of the ACM SIGCOMM Workshop on Future of Internet Routing & Addressing, (79-85)
  11. ACM
    Mbongue J, Kwadjo D, Shuping A and Bobda C (2021). Deploying Multi-tenant FPGAs within Linux-based Cloud Infrastructure, ACM Transactions on Reconfigurable Technology and Systems, 15:2, (1-31), Online publication date: 30-Jun-2022.
  12. ACM
    Damiani A, Fiscaletti G, Bacis M, Brondolin R and Santambrogio M (2022). BlastFunction: A Full-stack Framework Bringing FPGA Hardware Acceleration to Cloud-native Applications, ACM Transactions on Reconfigurable Technology and Systems, 15:2, (1-27), Online publication date: 30-Jun-2022.
  13. Zarour K and Benmerzoug D (2022). A Multi-Criteria Allocation Strategy for Provisioning Cloud Resources, International Journal of Systems and Service-Oriented Engineering, 12:1, (1-19), Online publication date: 4-Mar-2022.
  14. Lu J, Zhao W, Zhu H, Li J, Cheng Z and Xiao G (2022). Optimal machine placement based on improved genetic algorithm in cloud computing, The Journal of Supercomputing, 78:3, (3448-3476), Online publication date: 1-Feb-2022.
  15. ACM
    Wan K and Coffman J Game-theoretic modeling of DDoS attacks in cloud computing Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing, (1-10)
  16. ACM
    Anglano C, Canonico M and Guazzone M (2021). An educational toolkit for teaching cloud computing, ACM SIGCOMM Computer Communication Review, 51:4, (36-46), Online publication date: 24-Oct-2021.
  17. ACM
    Welsh T and Benkhelifa E (2020). On Resilience in Cloud Computing, ACM Computing Surveys, 53:3, (1-36), Online publication date: 31-May-2021.
  18. ACM
    Sun N, Wang W and Zhang G Analysis of Cloud Providers' Pricing Strategy based on extended Hotelling Model Proceedings of the 2021 3rd International Conference on Management Science and Industrial Engineering, (74-79)
  19. Khan S, Khan H, Ullah N, Khan R and Chen C (2021). Challenges and Their Practices in Adoption of Hybrid Cloud Computing, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  20. ACM
    Ding S, Liu Y, Zhang J, Tan Y, Li X and Tang R The Planning and Construction of Healthcare Big Data Platform Proceedings of the 2020 Conference on Artificial Intelligence and Healthcare, (170-176)
  21. ACM
    Zhang G, Chen Y and Li G The Evolution and Emerging Trends of Cloud Computing Adoption Research Proceedings of the 2020 3rd International Conference on Signal Processing and Machine Learning, (40-47)
  22. ACM
    Trinta F, Rego P and Viana W Teaching Development of Distributed Software during COVID-19 Proceedings of the XXXIV Brazilian Symposium on Software Engineering, (616-625)
  23. Owusu A (2020). Determinants of Cloud Business Intelligence Adoption Among Ghanaian SMEs, International Journal of Cloud Applications and Computing, 10:4, (48-69), Online publication date: 1-Oct-2020.
  24. Herzfeldt A, Ertl C, Rauer H and Weißbach R (2020). Cloud Computing as the Next Utility, International Journal of Cloud Applications and Computing, 10:4, (28-47), Online publication date: 1-Oct-2020.
  25. Singh J and Raghuvanshi K (2020). Regulations and Standards in Public Cloud, Journal of Information Technology Research, 13:3, (21-36), Online publication date: 1-Jul-2020.
  26. Rababah K, Bilal Ali Al-nassar and Al-Nsour S (2020). Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan, International Journal of Cloud Applications and Computing, 10:3, (96-110), Online publication date: 1-Jul-2020.
  27. ACM
    Roemsri P and Hewett R Provenance Location-based Authentication in Cloud Computing Proceedings of the 11th International Conference on Advances in Information Technology, (1-8)
  28. Schlagwein D, Schoder D and Spindeldreher K (2019). Consolidated, systemic conceptualization, and definition of the “sharing economy”, Journal of the Association for Information Science and Technology, 71:7, (817-838), Online publication date: 8-Jun-2020.
  29. ACM
    Mengistu T and Che D (2019). Survey and Taxonomy of Volunteer Computing, ACM Computing Surveys, 52:3, (1-35), Online publication date: 31-May-2020.
  30. Alzadjali K and Elbanna A (2019). Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman, Information Systems Frontiers, 22:2, (365-380), Online publication date: 1-Apr-2020.
  31. ACM
    Girardon G, Costa V, Machado R, Bernardino M, Legramante G, Basso F, de Macedo Rodrigues E and Neto A Testing as a service (TaaS) Proceedings of the 35th Annual ACM Symposium on Applied Computing, (1989-1996)
  32. Dey P and Yuksel M (2020). An Economic Analysis of Cloud-Assisted Routing for Wider Area SDN, IEEE Transactions on Network and Service Management, 17:1, (445-458), Online publication date: 1-Mar-2020.
  33. Kieffer E, Danoy G, Brust M, Bouvry P and Nagih A (2020). Tackling Large-Scale and Combinatorial Bi-Level Problems With a Genetic Programming Hyper-Heuristic, IEEE Transactions on Evolutionary Computation, 24:1, (44-56), Online publication date: 1-Feb-2020.
  34. ACM
    Sivakumar V, Ruthramathi R and Leelapriyadharsini S Challenges of Cloud Computing in Warehousing Operations with Respect to Chennai Port Trust Proceedings of the 2020 the 3rd International Conference on Computers in Management and Business, (162-165)
  35. Makhlouf R (2020). Cloudy transaction costs: a dive into cloud computing economics, Journal of Cloud Computing: Advances, Systems and Applications, 9:1, Online publication date: 13-Jan-2020.
  36. Abdelwahhab SATTA and Mostefai S (2020). Strategic Outsourcing to Cloud Computing, International Journal of Cloud Applications and Computing, 10:1, (11-27), Online publication date: 1-Jan-2020.
  37. Bhattacharya A, Choudhury S and Cortesi A (2019). Replaceability and negotiation in a cloud service ecosystem, Journal of Cloud Computing: Advances, Systems and Applications, 8:1, (1-14), Online publication date: 1-Dec-2019.
  38. Yavari M, Ghaffarpour Rahbar A and Fathi M (2019). Temperature and energy-aware consolidation algorithms in cloud computing, Journal of Cloud Computing: Advances, Systems and Applications, 8:1, (1-16), Online publication date: 1-Dec-2019.
  39. Hussein M, Mousa M and Alqarni M (2019). A placement architecture for a container as a service (CaaS) in a cloud environment, Journal of Cloud Computing: Advances, Systems and Applications, 8:1, (1-15), Online publication date: 1-Dec-2019.
  40. Nivethitha S, Gauthama Raman M, Gireesha O, Kannan K and Shankar Sriram V (2019). An improved rough set approach for optimal trust measure parameter selection in cloud environments, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:22, (11979-11999), Online publication date: 1-Nov-2019.
  41. Lin Y (2019). Editorial: Fourth Quarter 2019 IEEE Communications Surveys and Tutorials, IEEE Communications Surveys & Tutorials, 21:4, (3000-3006), Online publication date: 1-Oct-2019.
  42. Aceto G, Persico V and Pescapé A (2019). A Survey on Information and Communication Technologies for Industry 4.0: State-of-the-Art, Taxonomies, Perspectives, and Challenges, IEEE Communications Surveys & Tutorials, 21:4, (3467-3501), Online publication date: 1-Oct-2019.
  43. ACM
    Shah M, Zhang W, Hu H and Yu N (2019). Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations, ACM Transactions on Multimedia Computing, Communications, and Applications, 15:3, (1-21), Online publication date: 18-Sep-2019.
  44. ACM
    Yrjönkoski T and Systä K Productization levels towards whole product in SaaS business Proceedings of the 2nd ACM SIGSOFT International Workshop on Software-Intensive Business: Start-ups, Platforms, and Ecosystems, (42-47)
  45. ACM
    Saltan A Do we know how to price SaaS: a multi-vocal literature review Proceedings of the 2nd ACM SIGSOFT International Workshop on Software-Intensive Business: Start-ups, Platforms, and Ecosystems, (7-12)
  46. Sebaa A and Tari A (2019). Query optimization in cloud environments: challenges, taxonomy, and techniques, The Journal of Supercomputing, 75:8, (5420-5450), Online publication date: 1-Aug-2019.
  47. Yang C, Chen S, Liu J, Chan Y, Chen C and Verma V (2019). An energy-efficient cloud system with novel dynamic resource allocation methods, The Journal of Supercomputing, 75:8, (4408-4429), Online publication date: 1-Aug-2019.
  48. Ren L, Zhang Q, Shi W and Peng Y (2019). Edge-based personal computing services, Computing, 101:8, (1199-1223), Online publication date: 1-Aug-2019.
  49. Ferretti M, Santangelo L and Musci M (2019). Optimized cloud-based scheduling for protein secondary structure analysis, The Journal of Supercomputing, 75:7, (3499-3520), Online publication date: 1-Jul-2019.
  50. Gutiérrez-Aguado J, Claver J and Peña-Ortiz R (2019). Toward a transparent and efficient GPU cloudification architecture, The Journal of Supercomputing, 75:7, (3640-3672), Online publication date: 1-Jul-2019.
  51. ACM
    Rodrigues de Castro K A Feasible Community Cloud Architecture for Provisioning Infrastructure as a Service in the Government Sector Proceedings of the 20th Annual International Conference on Digital Government Research, (35-40)
  52. Vakili M, Jahangiri N and Sharifi M (2019). Cloud service selection using cloud service brokers, Frontiers of Computer Science: Selected Publications from Chinese Universities, 13:3, (599-617), Online publication date: 1-Jun-2019.
  53. Bedi R, Singh J and Gupta S (2019). MWC, The Journal of Supercomputing, 75:6, (3264-3287), Online publication date: 1-Jun-2019.
  54. Małysiak-Mrozek B, Baron T and Mrozek D (2019). Spark-IDPP, Cluster Computing, 22:2, (487-508), Online publication date: 1-Jun-2019.
  55. ACM
    Concone F, Re G and Morana M (2019). A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices, ACM Transactions on Internet Technology, 19:2, (1-20), Online publication date: 31-May-2019.
  56. Erbel J, Brand T, Giese H and Grabowski J OCCI-compliant, fully causal-connected architecture runtime models supporting sensor management Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (188-194)
  57. Leisner M and Brune P Good-bye localhost Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, (268-269)
  58. Naghash Asadi A, Abdollahi Azgomi M and Entezari-Maleki R (2019). Evaluation of the impacts of failures and resource heterogeneity on the power consumption and performance of IaaS clouds, The Journal of Supercomputing, 75:5, (2837-2861), Online publication date: 1-May-2019.
  59. Uzunkol O (2019). Comments on "verifiable outsourced attribute-based signature scheme", Multimedia Tools and Applications, 78:9, (11735-11742), Online publication date: 1-May-2019.
  60. Singh J (2020). Assessment of Digital Implementation in India and Challenges, International Journal of Digital Literacy and Digital Competence, 10:2, (37-53), Online publication date: 1-Apr-2019.
  61. Mahmud K and Usman M (2019). Trust Establishment and Estimation in Cloud Services, Journal of Network and Systems Management, 27:2, (489-540), Online publication date: 1-Apr-2019.
  62. ACM
    Scheuner J and Leitner P Performance Benchmarking of Infrastructure-as-a-Service (IaaS) Clouds with Cloud WorkBench Companion of the 2019 ACM/SPEC International Conference on Performance Engineering, (53-56)
  63. ACM
    Al-Sharafi M, Arshah R and Abu-Shanab E Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services Proceedings of the 2019 8th International Conference on Software and Computer Applications, (50-55)
  64. Demin B, Parlati S, Spinnato P and Stalio S (2019). U-LITE, a Private Cloud Approach for Particle Physics Computing, International Journal of Cloud Applications and Computing, 9:1, (1-15), Online publication date: 1-Jan-2019.
  65. Kushwah G and Ali S (2019). Distributed denial of service attacks detection in cloud computing using extreme learning machine, International Journal of Communication Networks and Distributed Systems, 23:3, (328-351), Online publication date: 1-Jan-2019.
  66. Skhiri R, Fresse V, Jamont J, Suffran B, Malek J and Margala M (2019). From FPGA to Support Cloud to Cloud of FPGA, International Journal of Reconfigurable Computing, 2019, Online publication date: 1-Jan-2019.
  67. Brous P, Janssen M, Herder P and Volchenkov D (2019). Next Generation Data Infrastructures, Complexity, 2019, Online publication date: 1-Jan-2019.
  68. Stupar I, Huljenić D and Riguzzi F (2019). Model-Based Extraction of Knowledge about the Effect of Cloud Application Context on Application Service Cost and Quality of Service, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
  69. Bondan L, Franco M, Marcuzzo L, Venancio G, Santos R, Pfitscher R, Scheid E, Stiller B, De Turck F, Duarte E, Schaeffer-Filho A, Santos C and Granville L (2019). FENDE, IEEE Communications Magazine, 57:1, (13-19), Online publication date: 1-Jan-2019.
  70. Li A, Tan S and Jia Y (2019). A method for achieving provable data integrity in cloud computing, The Journal of Supercomputing, 75:1, (92-108), Online publication date: 1-Jan-2019.
  71. ACM
    Alshamrani S An Efficient Allocation of Cloud Computing Resources Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, (68-75)
  72. Gu B, Zhou Z, Mumtaz S, Frascolla V and Kashif Bashir A Context-Aware Task Offloading for Multi-Access Edge Computing: Matching with Externalities 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  73. Smirnov A, Ponomarev A, Levashova T and Teslya N (2018). Human---Machine Cloud Decision Support in Tourism, Scientific and Technical Information Processing, 45:5, (352-359), Online publication date: 1-Dec-2018.
  74. Santos G, Takako Endo P, Ferreira Da Silva Lisboa Tigre M, Ferreira Da Silva L, Sadok D, Kelner J and Lynn T (2018). Analyzing the availability and performance of an e-health system integrated with edge, fog and cloud infrastructures, Journal of Cloud Computing: Advances, Systems and Applications, 7:1, (1-22), Online publication date: 1-Dec-2018.
  75. Araujo J, Maciel P, Andrade E, Callou G, Alves V and Cunha P (2018). Decision making in cloud environments, Journal of Cloud Computing: Advances, Systems and Applications, 7:1, (1-19), Online publication date: 1-Dec-2018.
  76. Kurimoto T, Urushidani S and Oki E (2018). Optimization Model for Designing Multiple Virtualized Campus Area Networks Coordinating With Wide Area Networks, IEEE Transactions on Network and Service Management, 15:4, (1349-1362), Online publication date: 1-Dec-2018.
  77. Sabi H, Uzoka F, Langmia K, Njeh F and Tsuma C (2018). A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa, Information Systems Frontiers, 20:6, (1381-1404), Online publication date: 1-Dec-2018.
  78. Hasham K and Munir K (2018). Reproducibility of scientific workflows execution using cloud-aware provenance (ReCAP), Computing, 100:12, (1299-1333), Online publication date: 1-Dec-2018.
  79. Smirnov A, Shchekotov M, Shilov N and Ponomarev A Decision Support Service Based on Dynamic Resource Network Configuration in Human-Computer Cloud Proceedings of the 23rd Conference of Open Innovations Association FRUCT, (362-368)
  80. Chen H, Zhu J, Wu G and Huo L (2018). Cost-efficient reactive scheduling for real-time workflows in clouds, The Journal of Supercomputing, 74:11, (6291-6309), Online publication date: 1-Nov-2018.
  81. Mishra A, Umrao B and Yadav D (2018). A survey on optimal utilization of preemptible VM instances in cloud computing, The Journal of Supercomputing, 74:11, (5980-6032), Online publication date: 1-Nov-2018.
  82. Silva G, Ré R and Silva M Evaluating efficiency, effectiveness and satisfaction of AWS and azure from the perspective of cloud beginners Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, (114-125)
  83. ACM
    Ziani A and Medouri A Risks and Security Requirements for Cloud Environments Proceedings of the 3rd International Conference on Smart City Applications, (1-6)
  84. Luo H, Wu K, Ruby R, Liang Y, Guo Z and Ni L (2018). Software-Defined Architectures and Technologies for Underwater Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, 20:4, (2855-2888), Online publication date: 1-Oct-2018.
  85. Retana G, Forman C, Narasimhan S, Niculescu M and Wu D (2018). Technology support and post-adoption IT service use, MIS Quarterly, 42:3, (961-978), Online publication date: 1-Sep-2018.
  86. Sabi H, Uzoka F and Mlay S (2018). Staff perception towards cloud computing adoption at universities in a developing country, Education and Information Technologies, 23:5, (1825-1848), Online publication date: 1-Sep-2018.
  87. Xu H, Liu Y, Wei W and Zhang W (2018). Incentive-aware virtual machine scheduling in cloud computing, The Journal of Supercomputing, 74:7, (3016-3038), Online publication date: 1-Jul-2018.
  88. ACM
    Al-shehri H and Hamdi K Energy-Aware Multi-Objective Placement of Virtual Machines in Cloud Data Centers Proceedings of the 2018 7th International Conference on Bioinformatics and Biomedical Science, (41-45)
  89. ACM
    D'Angelo G, Ferretti S and Marzolla M A Blockchain-based Flight Data Recorder for Cloud Accountability Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, (93-98)
  90. ACM
    Morais N, Frinhani R, Kuehne B, Filho D, Peixoto M and Batista B Performance Evaluation of Heuristics for Cloud Workload Balancing Proceedings of the XIV Brazilian Symposium on Information Systems, (1-8)
  91. ACM
    Pahl C, Jamshidi P and Zimmermann O (2018). Architectural Principles for Cloud Software, ACM Transactions on Internet Technology, 18:2, (1-23), Online publication date: 31-May-2018.
  92. ACM
    Krieter S, Krüger J, Weichbrodt N, Sartakov V, Kapitza R and Leich T Towards secure dynamic product lines in the cloud Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, (5-8)
  93. Dutt A, Jain H and Kumar S (2018). Providing Software as a Service, Information Systems and e-Business Management, 16:2, (327-356), Online publication date: 1-May-2018.
  94. ACM
    Kaci A, Nacef A and Henni A Mobile cloud system for road safety Proceedings of the International Conference on Geoinformatics and Data Analysis, (132-136)
  95. ACM
    Xiang J and Chen L A Method of Docker Container Forensics Based on API Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, (159-164)
  96. ACM
    Mohammadi M and Bazhirov T Comparative benchmarking of cloud computing vendors with high performance linpack Proceedings of the 2nd International Conference on High Performance Compilation, Computing and Communications, (1-5)
  97. Senyo P, Addae E and Boateng R (2018). Cloud computing research, International Journal of Information Management: The Journal for Information Professionals, 38:1, (128-139), Online publication date: 1-Feb-2018.
  98. (2018). Trust modelling for opportunistic cloud services, International Journal of Grid and Utility Computing, 9:4, (289-306), Online publication date: 1-Jan-2018.
  99. Li J, He S, Yin W and Tramontana E (2018). The Study of Pallet Pooling Information Platform Based on Cloud Computing, Scientific Programming, 2018, Online publication date: 1-Jan-2018.
  100. Chamoso P, González-Briones A, Rodríguez S, Corchado J and Sanchez R (2018). Tendencies of Technologies and Platforms in Smart Cities, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  101. Jimenez J, Diaz J, Lloret J and Romero O (2018). MHCP, IEEE Network: The Magazine of Global Internetworking, 33:1, (106-112), Online publication date: 1-Jan-2018.
  102. ACM
    van Eyk E, Iosup A, Seif S and Thömmes M The SPEC cloud group's research vision on FaaS and serverless architectures Proceedings of the 2nd International Workshop on Serverless Computing, (1-4)
  103. ACM
    Odun-Ayo I, Misra S, Abayomi-Alli O and Ajayi O Cloud Multi-Tenancy Companion Proceedings of the10th International Conference on Utility and Cloud Computing, (209-214)
  104. Seifu S, Dahiru A, Bass J and Allison I (2017). Cloud‐Computing, The Electronic Journal of Information Systems in Developing Countries, 78:1, (1-14), Online publication date: 5-Dec-2017.
  105. Abubakar A, Bass J and Allison I (2017). Cloud Computing, The Electronic Journal of Information Systems in Developing Countries, 62:1, (1-17), Online publication date: 5-Dec-2017.
  106. Blas M, Gonnet S and Leone H Routing structure over discrete event system specification Proceedings of the 2017 Winter Simulation Conference, (1-12)
  107. Caithness N, Drescher M and Wallom D (2017). Can functional characteristics usefully define the cloud computing landscape and is the current reference model correct?, Journal of Cloud Computing: Advances, Systems and Applications, 6:1, (1-13), Online publication date: 1-Dec-2017.
  108. Alkhalil A, Sahandi R and John D (2017). An exploration of the determinants for decision to migrate existing resources to cloud computing using an integrated TOE-DOI model, Journal of Cloud Computing: Advances, Systems and Applications, 6:1, (1-20), Online publication date: 1-Dec-2017.
  109. Gupta B and Badve O (2017). Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment, Neural Computing and Applications, 28:12, (3655-3682), Online publication date: 1-Dec-2017.
  110. Smirnov A, Ponomarev A, Levashova T and Shilov N Ontology-based Cloud Platform for Human-Driven Applications Proceedings of the 21st Conference of Open Innovations Association FRUCT, (304-310)
  111. ACM
    Triyason T, Tassanaviboon A and Arpnikanondt C Hybrid Cloud Architecture for Connected Thai Government Agency Proceedings of the 9th International Conference on Management of Digital EcoSystems, (181-187)
  112. Pourmajidi W, Steinbacher J, Erwin T and Miranskyy A On Challenges of Cloud Monitoring Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering, (259-265)
  113. Chen Y, Horng G, Li J and Cheng S (2017). Using Thermal-Aware VM Migration Mechanism for High-Availability Cloud Computing, Wireless Personal Communications: An International Journal, 97:1, (1475-1502), Online publication date: 1-Nov-2017.
  114. Chen H, Zhu J, Zhang Z, Ma M and Shen X (2017). Real-time workflows oriented online scheduling in uncertain cloud environment, The Journal of Supercomputing, 73:11, (4906-4922), Online publication date: 1-Nov-2017.
  115. ACM
    Ziani A, Sadouq Z and Medouri A Integration of cloud computing and GIS on vehicle traffic management Proceedings of the Mediterranean Symposium on Smart City Application, (1-5)
  116. Aburezeq I and Dweikat F (2017). Cloud Applications in Language Teaching, International Journal of Distance Education Technologies, 15:4, (39-60), Online publication date: 1-Oct-2017.
  117. Somu N, Kirthivasan K and Shankar Sriram V (2017). A rough set-based hypergraph trust measure parameter selection technique for cloud service selection, The Journal of Supercomputing, 73:10, (4535-4559), Online publication date: 1-Oct-2017.
  118. ACM
    Trinta F and Santos E Teaching Software Development for the Cloud Proceedings of the XXXI Brazilian Symposium on Software Engineering, (338-347)
  119. Balachandran B and Prasad S (2017). Challenges and Benefits of Deploying Big Data Analytics in the Cloud for Business Intelligence, Procedia Computer Science, 112:C, (1112-1122), Online publication date: 1-Sep-2017.
  120. Wakunuma K and Masika R (2017). Cloud computing, capabilities and intercultural ethics, Telecommunications Policy, 41:7, (695-707), Online publication date: 1-Aug-2017.
  121. Warren S, Oxburgh G, Briggs P and Wall D How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime? Human Aspects of Information Security, Privacy and Trust, (539-556)
  122. Sbaï Z, Guerfel R and Ben Ayed R (2017). On the Use of Similarity or Query Languages in Cloud Discovery Based on Ontology, International Journal of Service Science, Management, Engineering, and Technology, 8:3, (60-78), Online publication date: 1-Jul-2017.
  123. Chen T and Wang Y (2017). A nonlinearly normalized back propagation network and cloud computing approach for determining cycle time allowance during wafer fabrication, Robotics and Computer-Integrated Manufacturing, 45:C, (144-156), Online publication date: 1-Jun-2017.
  124. He H, Zhang J, Gu J, Hu Y and Xu F (2017). A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing, Cluster Computing, 20:2, (1457-1472), Online publication date: 1-Jun-2017.
  125. Sousa G, Rudametkin W and Duchien L Extending dynamic software product lines with temporal constraints Proceedings of the 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (129-139)
  126. Renzel D, Koren I, Klamma R and Jarke M Preparing research projects for sustainable software engineering in society Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Society Track, (23-32)
  127. de Alfonso C, Blanquer I, Moltó G and Caballer M Automatic Consolidation of Virtual Machines in On-Premises Cloud Platforms Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, (1070-1079)
  128. de Alfonso C, Calatrava A and Molt G (2017). Container-based virtual elastic clusters, Journal of Systems and Software, 127:C, (1-11), Online publication date: 1-May-2017.
  129. ACM
    Leite D, Peixoto M, Batista B, Kuehne B and Ferreira C The influence of resource allocation on cloud computing performance Proceedings of the Symposium on Applied Computing, (1516-1521)
  130. Sharif S, Watson P, Taheri J, Nepal S and Zomaya A (2017). Privacy-Aware Scheduling SaaS in High Performance Computing Environments, IEEE Transactions on Parallel and Distributed Systems, 28:4, (1176-1188), Online publication date: 1-Apr-2017.
  131. Ullrich J, Zseby T, Fabini J and Weippl E (2017). Network-Based Secret Communication in Clouds: A Survey, IEEE Communications Surveys & Tutorials, 19:2, (1112-1144), Online publication date: 1-Apr-2017.
  132. Li Z, Zhu S, Hong H, Li Y and El Saddik A (2017). City digital pulse, Multimedia Tools and Applications, 76:8, (10893-10916), Online publication date: 1-Apr-2017.
  133. ACM
    Samadi Y and Zbakh M Threshold-based load balancing algorithm for Big Data on a Cloud environment Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, (1-6)
  134. ACM
    Nikolopoulos F and Likothanassis S Using UTAUT2 for cloud computing technology acceptance modeling Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (1-6)
  135. Amiri M and Mohammad-Khanli L (2017). Survey on prediction models of applications for resources provisioning in cloud, Journal of Network and Computer Applications, 82:C, (93-113), Online publication date: 15-Mar-2017.
  136. Sahli H, Belala F and Bouanaka C (2017). Formal verification of cloud systems elasticity, International Journal of Critical Computer-Based Systems, 6:4, (364-384), Online publication date: 1-Jan-2017.
  137. Bojanova I and Voas J (2017). Trusting the Internet of Things, IT Professional, 19:5, (16-19), Online publication date: 1-Jan-2017.
  138. Inmor S and Suwannahong R (2017). The Acceptance of Cloud Computing for IT Workers in Thailand, Procedia Computer Science, 121:C, (1039-1046), Online publication date: 1-Jan-2017.
  139. Branco T, de S-Soares F and Rivero A (2017). Key Issues for the Successful Adoption of Cloud Computing, Procedia Computer Science, 121:C, (115-122), Online publication date: 1-Jan-2017.
  140. Pacevič R and Kačeniauskas A (2017). The development of VisLT visualization service in Openstack cloud infrastructure, Advances in Engineering Software, 103:C, (46-56), Online publication date: 1-Jan-2017.
  141. ACM
    Pham L and Nguyen T AutoBot Proceedings of the 7th Symposium on Information and Communication Technology, (403-410)
  142. ACM
    Leitner P, Cito J and Stöckli E Modelling and managing deployment costs of microservice-based cloud applications Proceedings of the 9th International Conference on Utility and Cloud Computing, (165-174)
  143. Opara-Martins J, Sahandi R and Tian F (2016). Critical analysis of vendor lock-in and its impact on cloud computing migration, Journal of Cloud Computing: Advances, Systems and Applications, 5:1, (1-18), Online publication date: 1-Dec-2016.
  144. Zawawi N, Hamdy M, Ghary R and Tolba M (2016). Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 20:12, (5039-5050), Online publication date: 1-Dec-2016.
  145. Hong J and Kim D (2016). Towards scalable security analysis using multi-layered security models, Journal of Network and Computer Applications, 75:C, (156-168), Online publication date: 1-Nov-2016.
  146. Hsu C and Lin J (2016). Factors affecting the adoption of cloud services in enterprises, Information Systems and e-Business Management, 14:4, (791-822), Online publication date: 1-Nov-2016.
  147. dos Santos D, Marinho R, Schmitt G, Westphall C and Westphall C (2016). A framework and risk assessment approaches for risk-based access control in the cloud, Journal of Network and Computer Applications, 74:C, (86-97), Online publication date: 1-Oct-2016.
  148. Yousafzai A, Chang V, Gani A and Noor R (2016). Multimedia augmented m-learning, International Journal of Information Management: The Journal for Information Professionals, 36:5, (784-792), Online publication date: 1-Oct-2016.
  149. Carniani E, D'Arenzo D, Lazouski A, Martinelli F and Mori P (2016). Usage Control on Cloud systems, Future Generation Computer Systems, 63:C, (37-55), Online publication date: 1-Oct-2016.
  150. Al Buhussain A, De Grande R and Boukerche A Elasticity Based Scheduling Heuristic Algorithm for Cloud Environments Proceedings of the 20th International Symposium on Distributed Simulation and Real-Time Applications, (1-8)
  151. (2016). A survey on cloud federation architectures, Journal of Network and Computer Applications, 72:C, (51-71), Online publication date: 1-Sep-2016.
  152. Cavalcante E, Pereira J, Alves M, Maia P, Moura R, Batista T, Delicato F and Pires P (2016). On the interplay of Internet of Things and Cloud Computing, Computer Communications, 89:C, (17-33), Online publication date: 1-Sep-2016.
  153. Mateus R, Siqueira T, Times V, Ciferri R and Aguiar Ciferri C (2016). Spatial data warehouses and spatial OLAP come towards the cloud, Distributed and Parallel Databases, 34:3, (425-461), Online publication date: 1-Sep-2016.
  154. Tihfon G, Park S, Kim J and Kim Y (2016). An efficient multi-task PaaS cloud infrastructure based on docker and AWS ECS for application deployment, Cluster Computing, 19:3, (1585-1597), Online publication date: 1-Sep-2016.
  155. Leite A, Boukerche A, Magalhaes Alves deźMelo A, Eisenbeis C, Tadonki C and Ralha C (2016). Power-aware server consolidation for federated clouds, Concurrency and Computation: Practice & Experience, 28:12, (3427-3444), Online publication date: 25-Aug-2016.
  156. ACM
    Tiwari A and Sharma R Potent Cloud Services Utilization with Efficient Revised Rough Set Optimization Service Parameters Proceedings of the International Conference on Advances in Information Communication Technology & Computing, (1-7)
  157. Calatrava A, Romero E, Moltó G, Caballer M and Alonso J (2016). Self-managed cost-efficient virtual elastic clusters on hybrid Cloud infrastructures, Future Generation Computer Systems, 61:C, (13-25), Online publication date: 1-Aug-2016.
  158. Zhang S, Yang G and Mu Y Linear Encryption with Keyword Search Proceedings, Part II, of the 21st Australasian Conference on Information Security and Privacy - Volume 9723, (187-203)
  159. Colman-Meixner C, Develder C, Tornatore M and Mukherjee B (2016). A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications, IEEE Communications Surveys & Tutorials, 18:3, (2244-2281), Online publication date: 1-Jul-2016.
  160. ACM
    Chen M, Zadok E, Vasudevan A and Wang K SeMiNAS Proceedings of the 9th ACM International on Systems and Storage Conference, (1-13)
  161. Ayeb N, Di Cerbo F and Trabelsi S Enhancing Access Control Trees for Cloud Computing ICWE 2016 International Workshops on Current Trends in Web Engineering - Volume 9881, (29-38)
  162. Mwalongo F, Krone M, Reina G and Ertl T (2016). State-of-the-Art Report in Web-based Visualization, Computer Graphics Forum, 35:3, (553-575), Online publication date: 1-Jun-2016.
  163. Madni S, Latiff M, Coulibaly Y and Abdulhamid S (2016). Resource scheduling for infrastructure as a service (IaaS) in cloud computing, Journal of Network and Computer Applications, 68:C, (173-200), Online publication date: 1-Jun-2016.
  164. Zeng Z, Truong-Huu T, Veeravalli B and Tham C (2016). Operational cost-aware resource provisioning for continuous write applications in cloud-of-clouds, Cluster Computing, 19:2, (601-614), Online publication date: 1-Jun-2016.
  165. Abbes H and Louati T (2016). PGTrust, Cluster Computing, 19:2, (585-599), Online publication date: 1-Jun-2016.
  166. Gupta S and Misra S (2016). Compliance, network, security and the people related factors in cloud ERP implementation, International Journal of Communication Systems, 29:8, (1395-1419), Online publication date: 25-May-2016.
  167. Silva K, Rocha A and Guimaraes F Trust in the Cloud from the Sec- SLA construction in various models as deployment and service Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (329-336)
  168. Alves J, Westphall C and Schmitt G A Risk Calculus Extension to the XACML Language Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (321-328)
  169. Osanaiye O, Choo K and Dlodlo M (2016). Distributed denial of service (DDoS) resilience in cloud, Journal of Network and Computer Applications, 67:C, (147-165), Online publication date: 1-May-2016.
  170. Sabi H, Uzoka F, Langmia K and Njeh F (2016). Conceptualizing a model for adoption of cloud computing in education, International Journal of Information Management: The Journal for Information Professionals, 36:2, (183-191), Online publication date: 1-Apr-2016.
  171. Morariu O, Morariu C and Borangiu T (2016). Shop-floor resource virtualization layer with private cloud support, Journal of Intelligent Manufacturing, 27:2, (447-462), Online publication date: 1-Apr-2016.
  172. Marangos N, Rizomiliotis P and Mitrou L (2016). Time synchronization, Security and Communication Networks, 9:6, (571-582), Online publication date: 1-Apr-2016.
  173. ACM
    Al-Ghuwairi A, Khalaf M, Al-Yasen L, Salah Z, Alsarhan A and Baarah A A Dynamic Model for automatic Updating cloud computing SLA (DSLA) Proceedings of the International Conference on Internet of things and Cloud Computing, (1-7)
  174. ACM
    Al-Ghuwairi A, Eid H, Aloran M, Salah Z, Baarah A and Al-oqaily A A mutation-based model to rank testing as a service (TaaS) Providers in cloud computing Proceedings of the International Conference on Internet of things and Cloud Computing, (1-5)
  175. ACM
    Almubaddel M and Elmogy A Cloud Computing Antecedents, Challenges, and Directions Proceedings of the International Conference on Internet of things and Cloud Computing, (1-5)
  176. ACM
    Ali-Eldin A, Ilyushkin A, Ghit B, Herbst N, Papadopoulos A and Iosup A Which Cloud Auto-Scaler Should I Use for my Application? Proceedings of the 7th ACM/SPEC on International Conference on Performance Engineering, (131-132)
  177. Perumal B and Murugaiyan A (2016). A Firefly Colony and Its Fuzzy Approach for Server Consolidation and Virtual Machine Placement in Cloud Datacenters, Advances in Fuzzy Systems, 2016, (5), Online publication date: 1-Mar-2016.
  178. (2016). Cost optimization approaches for scientific workflow scheduling in cloud and grid computing, Journal of Systems and Software, 113:C, (1-26), Online publication date: 1-Mar-2016.
  179. López García Á and Fernández del Castillo E (2016). Efficient image deployment in cloud environments, Journal of Network and Computer Applications, 63:C, (140-149), Online publication date: 1-Mar-2016.
  180. Da Silva R and Da Fonseca N (2016). Topology-Aware Virtual Machine Placement in Data Centers, Journal of Grid Computing, 14:1, (75-90), Online publication date: 1-Mar-2016.
  181. ACM
    Gesvindr D and Buhnova B (2016). Performance Challenges, Current Bad Practices, and Hints in PaaS Cloud Application Design, ACM SIGMETRICS Performance Evaluation Review, 43:4, (3-12), Online publication date: 25-Feb-2016.
  182. ACM
    Sgandurra D and Lupu E (2016). Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems, ACM Computing Surveys, 48:3, (1-38), Online publication date: 8-Feb-2016.
  183. ACM
    Faniyi F and Bahsoon R (2015). A Systematic Review of Service Level Management in the Cloud, ACM Computing Surveys, 48:3, (1-27), Online publication date: 8-Feb-2016.
  184. ACM
    Lemos A, Daniel F and Benatallah B (2015). Web Service Composition, ACM Computing Surveys, 48:3, (1-41), Online publication date: 8-Feb-2016.
  185. Quwaider M and Jararweh Y (2016). Cloud-assisted data management in wireless body area networks, International Journal of Computational Science and Engineering, 14:1, (16-26), Online publication date: 1-Jan-2016.
  186. Rocha V, Kon F, Cobe R and Wassermann R (2016). A hybrid cloud-P2P architecture for multimedia information retrieval on VoD services, Computing, 98:1-2, (73-92), Online publication date: 1-Jan-2016.
  187. Zhao J, Tao J and Streit A (2016). Enabling collaborative MapReduce on the Cloud with a single-sign-on mechanism, Computing, 98:1-2, (55-72), Online publication date: 1-Jan-2016.
  188. ACM
    Yoginath S and Perumalla K (2015). Efficient Parallel Discrete Event Simulation on Cloud/Virtual Machine Platforms, ACM Transactions on Modeling and Computer Simulation, 26:1, (1-26), Online publication date: 28-Dec-2016.
  189. Assis M and Bittencourt L An analysis of the voluntary aspect in cloud federations Proceedings of the 8th International Conference on Utility and Cloud Computing, (500-505)
  190. Assis M and Bittencourt L Multiclouds tournament blueprint Proceedings of the 8th International Conference on Utility and Cloud Computing, (404-405)
  191. Baur D, Seybold D, Griesinger F, Tsitsipas A, Hauser C and Domaschka J Cloud orchestration features Proceedings of the 8th International Conference on Utility and Cloud Computing, (95-101)
  192. ACM
    Schoonjans A, Van Landuyt D, Lagaisse B and Joosen W On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware, (1-6)
  193. Hsu C, Slagter K and Chung Y (2015). Locality and loading aware virtual machine mapping techniques for optimizing communications in MapReduce applications, Future Generation Computer Systems, 53:C, (43-54), Online publication date: 1-Dec-2015.
  194. Filiposka S, Mishev A and Juiz C (2015). Community-based VM placement framework, The Journal of Supercomputing, 71:12, (4504-4528), Online publication date: 1-Dec-2015.
  195. Barnawi A, Awad A, Elgammal A, El Shawi R, Almalaise A and Sakr S (2015). Runtime self-monitoring approach of business process compliance in cloud environments, Cluster Computing, 18:4, (1503-1526), Online publication date: 1-Dec-2015.
  196. Hong J, Chung C, Huang D and Kim D Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Proceedings of the ICA3PP International Workshops and Symposiums on Algorithms and Architectures for Parallel Processing - Volume 9532, (582-592)
  197. Zhang S, Mu Y and Yang G Threshold Broadcast Encryption with Keyword Search Revised Selected Papers of the 11th International Conference on Information Security and Cryptology - Volume 9589, (322-337)
  198. Hadded L, Charrada F and Tata S An Efficient Optimization Algorithm of Autonomic Managers in Service-Based Applications Proceedings of the Confederated International Conferences on On the Move to Meaningful Internet Systems: OTM 2015 Conferences - Volume 9415, (19-37)
  199. ACM
    Cito J, Leitner P, Gall H, Dadashi A, Keller A and Roth A Runtime metric meets developer: building better cloud applications using feedback 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!), (14-27)
  200. ACM
    Felsch D, Heiderich M, Schulz F and Schwenk J How Private is Your Private Cloud? Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, (5-16)
  201. Liu C, Huang K, Lee Y and Lai K (2015). Efficient Resource Allocation Mechanism for Federated Clouds, International Journal of Grid and High Performance Computing, 7:4, (74-87), Online publication date: 1-Oct-2015.
  202. ACM
    Chochliouros I, Spiliopoulou A, Stephanakis I, Arvanitozisis D, Sfakianakis E, Belesioti M, Georgiadou E and Mitsopoulou N Security and Protection of Critical Infrastructures Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS), (1-10)
  203. Wu F, Wu Q and Tan Y (2015). Workflow scheduling in cloud, The Journal of Supercomputing, 71:9, (3373-3418), Online publication date: 1-Sep-2015.
  204. Stanton B, Theofanos M and Joshi K Framework for Cloud Usability Proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 9190, (664-671)
  205. Dawkins S and Laskowski S Personalized Voting Proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 9190, (495-505)
  206. Yang Q, Zhou Y, Yu Y, Yuan J, Xing X and Du S (2015). Multi-step-ahead host load prediction using autoencoder and echo state networks in cloud computing, The Journal of Supercomputing, 71:8, (3037-3053), Online publication date: 1-Aug-2015.
  207. Chi H, Wang J, Wang X, Truijens M and Yung P (2015). A Conceptual Framework of Quality-Assured Fabrication, Delivery and Installation Processes for Liquefied Natural Gas (LNG) Plant Construction, Journal of Intelligent and Robotic Systems, 79:3-4, (433-448), Online publication date: 1-Aug-2015.
  208. ACM
    Sookhak M, Gani A, Talebian H, Akhunzada A, Khan S, Buyya R and Zomaya A (2015). Remote Data Auditing in Cloud Computing Environments, ACM Computing Surveys, 47:4, (1-34), Online publication date: 21-Jul-2015.
  209. ACM
    Van Landuyt D, Walraven S and Joosen W Variability middleware for multi-tenant SaaS applications Proceedings of the 19th International Conference on Software Product Line, (211-215)
  210. ACM
    Scheuner J, Cito J, Leitner P and Gall H Cloud WorkBench Proceedings of the 24th International Conference on World Wide Web, (239-242)
  211. Nikravesh A, Ajila S and Lung C Towards an autonomic auto-scaling prediction system for cloud resource provisioning Proceedings of the 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (35-45)
  212. Segura V, Tizzei L, de F. Ramirez J, dos Santos M, Azevedo L and de G. Cerqueira R WISE-SPL Proceedings of the Fifth International Workshop on Product LinE Approaches in Software Engineering, (7-10)
  213. Povar D, Saibharath   and Geethakumari G (2015). Real-time digital forensic triaging for cloud data analysis using MapReduce on Hadoop framework, International Journal of Electronic Security and Digital Forensics, 7:2, (119-133), Online publication date: 1-May-2015.
  214. Samanthula B, Elmehdwi Y and Wei Jiang (2015). k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data, IEEE Transactions on Knowledge and Data Engineering, 27:5, (1261-1273), Online publication date: 1-May-2015.
  215. Mc Evoy G, Mury A and Schulze B (2015). An analysis of definition and placement of virtual machines for high performance applications on Clouds, Concurrency and Computation: Practice & Experience, 27:7, (1789-1814), Online publication date: 1-May-2015.
  216. ACM
    Lawall A, Reichelt D and Schaller T Resource management and authorization for cloud services Proceedings of the 7th International Conference on Subject-Oriented Business Process Management, (1-8)
  217. ACM
    Roy A, Sarkar S, Ganesan R and Goel G (2015). Secure the Cloud, ACM Computing Surveys, 47:3, (1-30), Online publication date: 16-Apr-2015.
  218. ACM
    Pustchi N, Krishnan R and Sandhu R Authorization Federation in IaaS Multi Cloud Proceedings of the 3rd International Workshop on Security in Cloud Computing, (63-71)
  219. Ahmad M, Pervez Z, Cheong T and Lee S (2015). Oblivious user management for cloud-based data synchronization, The Journal of Supercomputing, 71:4, (1378-1400), Online publication date: 1-Apr-2015.
  220. Alhamazani K, Ranjan R, Mitra K, Rabhi F, Jayaraman P, Khan S, Guabtni A and Bhatnagar V (2015). An overview of the commercial cloud monitoring tools, Computing, 97:4, (357-377), Online publication date: 1-Apr-2015.
  221. Tilkov S (2015). The Modern Cloud-Based Platform, IEEE Software, 32:2, (116-116), Online publication date: 1-Mar-2015.
  222. Serrano N, Gallardo G and Hernantes J (2015). Infrastructure as a Service and Cloud Technologies, IEEE Software, 32:2, (30-36), Online publication date: 1-Mar-2015.
  223. Fabian B, Ermakova T and Junghanns P (2015). Collaborative and secure sharing of healthcare data in multi-clouds, Information Systems, 48:C, (132-150), Online publication date: 1-Mar-2015.
  224. Samanthula B, Elmehdwi Y, Howser G and Madria S (2015). A secure data sharing and query processing framework via federation of cloud computing, Information Systems, 48:C, (196-212), Online publication date: 1-Mar-2015.
  225. Mulfari D, Celesti A and Villari M (2015). A computer system architecture providing a user-friendly man machine interface for accessing assistive technology in cloud computing, Journal of Systems and Software, 100:C, (129-138), Online publication date: 1-Feb-2015.
  226. ACM
    Lehrig S and Becker S Beyond Simulation Proceedings of the 2015 Workshop on Challenges in Performance Methods for Software Development, (29-34)
  227. Hashemi S, Monfaredi K and Hashemi S (2015). Cloud Computing for Secure Services in E-Government Architecture, Journal of Information Technology Research, 8:1, (43-61), Online publication date: 1-Jan-2015.
  228. Hashemi S, Monfaredi K and Hashemi S (2015). Cloud Computing for Secure Services in E-Government Architecture, Journal of Information Technology Research, 8:1, (43-61), Online publication date: 1-Jan-2015.
  229. Hashemi S, Monfaredi K and Hashemi S (2015). Cloud Computing for Secure Services in E-Government Architecture, Journal of Information Technology Research, 8:1, (43-61), Online publication date: 1-Jan-2015.
  230. Hashemi S, Monfaredi K and Hashemi S (2015). Cloud Computing for Secure Services in E-Government Architecture, Journal of Information Technology Research, 8:1, (43-61), Online publication date: 1-Jan-2015.
  231. Mohammed F and Ibrahim O (2015). Drivers of Cloud Computing Adoption for E-Government Services Implementation, International Journal of Distributed Systems and Technologies, 6:1, (1-14), Online publication date: 1-Jan-2015.
  232. Hashem I, Yaqoob I, Anuar N, Mokhtar S, Gani A and Ullah Khan S (2015). The rise of "big data" on cloud computing, Information Systems, 47:C, (98-115), Online publication date: 1-Jan-2015.
  233. Assis M, Bittencourt L and Tolosana-Calasanz R Cloud Federation Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, (585-590)
  234. Ge X, Qi Z, Chen K, Duan J and Dong Z Loosely-Coupled Benchmark Framework Automates Performance Modeling on IaaS Clouds Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, (473-480)
  235. Kowsar Y, Dashnow H and Lonie A Data Interlocking Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, (696-701)
  236. ACM
    Bessani A, Cutillo L, Ramunno G, Schirmer N and Smiraglia P (2014). The TClouds Platform, ACM SIGOPS Operating Systems Review, 48:2, (13-22), Online publication date: 5-Dec-2014.
  237. Mosch M, Groβ S and Schill A (2014). User-controlled resource management in federated clouds, Journal of Cloud Computing: Advances, Systems and Applications, 3:1, (1-18), Online publication date: 1-Dec-2014.
  238. Dautov R, Paraskakis I and Stannett M (2014). Towards a framework for monitoring cloud application platforms as sensor networks, Cluster Computing, 17:4, (1203-1213), Online publication date: 1-Dec-2014.
  239. ACM
    Ru J, Grundy J and Keung J Software engineering for multi-tenancy computing challenges and implications Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices, (1-10)
  240. ACM
    Mainka C, Mladenov V, Feldmann F, Krautwald J and Schwenk J Your Software at my Service Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, (93-104)
  241. Cerbo F and Trabelsi S Re-Identification Risk Based Security Controls Proceedings of the Confederated International Workshops on On the Move to Meaningful Internet Systems: OTM 2014 Workshops - Volume 8842, (99-107)
  242. ACM
    Supriya M, Sangeeta K and Patra G Estimation of Trust values for Varying Levels of Trustworthiness based on Infrastructure as a Service Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, (1-9)
  243. ACM
    Raju B and Geethakumari G A novel approach for incident response in cloud using forensics Proceedings of the 7th ACM India Computing Conference, (1-6)
  244. Riley T and Hao W (2014). Building a cloud-based solution, Journal of Computing Sciences in Colleges, 30:1, (29-35), Online publication date: 1-Oct-2014.
  245. Horri A, Mozafari M and Dastghaibyfard G (2014). Novel resource allocation algorithms to performance and energy efficiency in cloud computing, The Journal of Supercomputing, 69:3, (1445-1461), Online publication date: 1-Sep-2014.
  246. Singh J and Kumar V (2014). Multi-Disciplinary Research Issues in Cloud Computing, Journal of Information Technology Research, 7:3, (32-53), Online publication date: 1-Jul-2014.
  247. Jouini M and Rabai L (2014). A Security Risk Management Metric for Cloud Computing Systems, International Journal of Organizational and Collective Intelligence, 4:3, (1-21), Online publication date: 1-Jul-2014.
  248. ACM
    Riteau P, Hwang M, Padmanabhan A, Gao Y, Liu Y, Keahey K and Wang S A cloud computing approach to on-demand and scalable cybergis analytics Proceedings of the 5th ACM workshop on Scientific cloud computing, (17-24)
  249. ACM
    Zeng J, Ruan G, Crowell A, Prakash A and Plale B Cloud computing data capsules for non-consumptiveuse of texts Proceedings of the 5th ACM workshop on Scientific cloud computing, (9-16)
  250. ACM
    Paladi N, Michalas A and Gehrmann C Domain based storage protection with secure access control for the cloud Proceedings of the 2nd international workshop on Security in cloud computing, (35-42)
  251. Krebs R, Spinner S, Ahmed N and Kounev S Resource usage control in multi-tenant applications Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (122-131)
  252. Sadooghi I, Palur S, Anthony A, Kapur I, Belagodu K, Purandare P, Ramamurty K, Wang K and Raicu I Achieving efficient distributed scheduling with message queues in the cloud for many-task computing and high-performance computing Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (404-413)
  253. Almeida A, Dantas F, Cavalcante E and Batista T A branch-and-bound algorithm for autonomic adaptation of multi-cloud applications Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (315-323)
  254. ACM
    Krainer C and Kirsch C Cyber-physical cloud computing implemented as PaaS Proceedings of the 4th ACM SIGBED International Workshop on Design, Modeling, and Evaluation of Cyber-Physical Systems, (15-18)
  255. Boukerche A, Loureiro A, Nakamura E, Oliveira H, Ramos H and Villas L (2014). Cloud-assisted Computing for Event-driven Mobile Services, Mobile Networks and Applications, 19:2, (161-170), Online publication date: 1-Apr-2014.
  256. ACM
    Warren L and Chi H Securing EHRs via CPMA attribute-based encryption on cloud systems Proceedings of the 2014 ACM Southeast Conference, (1-7)
  257. ACM
    Murakami K, Yamada T, Yamaguchi R, Goshima M and Sakai S A cloud architecture for protecting guest's information from malicious operators with memory management Proceedings of the 4th ACM conference on Data and application security and privacy, (155-158)
  258. Kourtesis D, Alvarez-Rodríguez J and Paraskakis I (2014). Semantic-based QoS management in cloud systems, Future Generation Computer Systems, 32:C, (307-323), Online publication date: 1-Mar-2014.
  259. ACM
    Lango J (2014). Toward software-defined SLAs, Communications of the ACM, 57:1, (54-60), Online publication date: 1-Jan-2014.
  260. ACM
    Desair T, Joosen W, Lagaisse B, Rafique A and Walraven S Policy-driven middleware for heterogeneous, hybrid cloud platforms Proceedings of the 12th International Workshop on Adaptive and Reflective Middleware, (1-6)
  261. ACM
    Poh G, Mohd Nazir M, Goi B, Tan S, Phan R and Shamsudin M An authentication framework for peer-to-peer cloud Proceedings of the 6th International Conference on Security of Information and Networks, (94-101)
  262. Martin P, Zulkernine F, Khalifa S, Eftekhari A, Ashtiani B, Rope D, McRoberts M and Statchuk C Analytics-as-a-service Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research, (392-395)
  263. ACM
    Cano-Parra R, Gómez-Sánchez E, Bote-Lorenzo M and González-Martínez J Cloud-based simulation for education Proceedings of the First International Conference on Technological Ecosystem for Enhancing Multiculturality, (209-214)
  264. Paladi N, Gehrmann C and Morenius F Domain-Based Storage Protection DBSP in Public Infrastructure Clouds Proceedings of the 18th Nordic Conference on Secure IT Systems - Volume 8208, (279-296)
  265. ACM
    Muriithi G and Kotzé J A conceptual framework for delivering cost effective business intelligence solutions as a service Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, (96-100)
  266. Sun J, Wang X, Li K, Wu C, Huang M and Wang X An Auction and League Championship Algorithm Based Resource Allocation Mechanism for Distributed Cloud Revised Selected Papers of the 10th International Symposium on Advanced Parallel Processing Technologies - Volume 8299, (334-346)
  267. Qin E, Long Y, Zhang C and Huang L Cloud computing and the internet of things Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction for health, safety, mobility and complex environments - Volume Part II, (173-180)
  268. Cavalcante E, Medeiros A and Batista T Describing cloud applications architectures Proceedings of the 7th European conference on Software Architecture, (320-323)
  269. Van Den Bossche R, Vanmechelen K and Broeckhove J (2013). Online cost-efficient scheduling of deadline-constrained workloads on hybrid clouds, Future Generation Computer Systems, 29:4, (973-985), Online publication date: 1-Jun-2013.
  270. ACM
    Paraiso F, Merle P and Seinturier L Managing elasticity across multiple cloud providers Proceedings of the 2013 international workshop on Multi-cloud applications and federated clouds, (53-60)
  271. Forde T and Doyle L (2013). Cellular clouds, Telecommunications Policy, 37:2-3, (194-207), Online publication date: 1-Mar-2013.
  272. Brocco A (2013). The grid, the load and the gradient, Natural Computing: an international journal, 12:1, (69-85), Online publication date: 1-Mar-2013.
  273. Cuomo A, Modica G, Distefano S, Puliafito A, Rak M, Tomarchio O, Venticinque S and Villano U (2013). An SLA-based Broker for Cloud Infrastructures, Journal of Grid Computing, 11:1, (1-25), Online publication date: 1-Mar-2013.
  274. Lin J, Zha L and Xu Z (2013). Consolidated cluster systems for data centers in the cloud age, Frontiers of Computer Science: Selected Publications from Chinese Universities, 7:1, (1-19), Online publication date: 1-Feb-2013.
  275. ACM
    Ismail M, Aborujilah A, Musa S and Shahzad A Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, (1-6)
  276. ACM
    Mokhtar S, Ali S, Al-Sharafi A and Aborujilah A Cloud computing in academic institutions Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, (1-7)
  277. Mondéjar R, García-López P, Pairot C and Pamies-Juarez L (2013). CloudSNAP, Future Generation Computer Systems, 29:1, (370-380), Online publication date: 1-Jan-2013.
  278. Paladi N, Gehrmann C, Aslam M and Morenius F Trusted launch of virtual machine instances in public iaas environments Proceedings of the 15th international conference on Information Security and Cryptology, (309-323)
  279. ACM
    Modi C, Patel D, Borisanya B, Patel A and Rajarajan M A novel framework for intrusion detection in cloud Proceedings of the Fifth International Conference on Security of Information and Networks, (67-74)
  280. Nhan T, Sunyé G and Jézéquel J A model-driven approach for virtual machine image provisioning in cloud computing Proceedings of the First European conference on Service-Oriented and Cloud Computing, (107-121)
  281. ACM
    Siládi V, Huraj L, Polčák N and Vesel E A parallel processing of spatial data interpolation on computing cloud Proceedings of the Fifth Balkan Conference in Informatics, (193-198)
  282. Copie A, Fortiş T and Munteanu V Data security perspectives in the framework of cloud governance Proceedings of the 18th international conference on Parallel processing workshops, (24-33)
  283. ACM
    Shabeera T, Chandran P and Kumar S Authenticated and persistent skip graph Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (155-160)
  284. Uehara M (2012). Metabolic Computing, International Journal of Distributed Systems and Technologies, 3:3, (27-39), Online publication date: 1-Jul-2012.
  285. ACM
    Faniyi F and Bahsoon R Self-managing SLA compliance in cloud architectures Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems, (61-70)
  286. ACM
    Stabler G, Rosen A, Goasguen S and Wang K Elastic IP and security groups implementation using OpenFlow Proceedings of the 6th international workshop on Virtualization Technologies in Distributed Computing Date, (53-60)
  287. ACM
    Reixa M, Costa C and Aparicio M Cloud services evaluation framework Proceedings of the Workshop on Open Source and Design of Communication, (61-69)
  288. Noman A and Adams C (2012). Providing a data location assurance service for cloud storage environments, Journal of Mobile Multimedia, 8:4, (265-286), Online publication date: 1-Jun-2012.
  289. Vanmechelen K, De Munck S and Broeckhove J Conservative Distributed Discrete Event Simulation on Amazon EC2 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), (853-860)
  290. Anbar A, Narayana V and El-Ghazawi T Distributed Shared Memory Programming in the Cloud Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), (707-708)
  291. Du L Pricing and Resource Allocation in a Cloud Computing Market Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), (817-822)
  292. Katsaros G, Kousiouris G, Gogouvitis S, Kyriazis D, Menychtas A and Varvarigou T (2012). A Self-adaptive hierarchical monitoring mechanism for Clouds, Journal of Systems and Software, 85:5, (1029-1041), Online publication date: 1-May-2012.
  293. Khajeh-Hosseini A, Greenwood D, Smith J and Sommerville I (2012). The Cloud Adoption Toolkit: supporting cloud adoption decisions in the enterprise, Software—Practice & Experience, 42:4, (447-465), Online publication date: 1-Apr-2012.
  294. Bruneo D, Longo F, Puliafito A, Scarpa M and Distefano S Software rejuvenation in the cloud Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, (8-16)
  295. Majuntke M, Dobre D, Cachin C and Suri N Fork-Consistent constructions from registers Proceedings of the 15th international conference on Principles of Distributed Systems, (283-298)
  296. King T, Ganti A and Froslie D Enabling automated integration testing of cloud application services in virtualized environments Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research, (120-132)
  297. Spies M Rule-enhanced domain models for cloud security governance, risk and compliance management Proceedings of the 5th international conference on Rule-based modeling and computing on the semantic web, (2-9)
  298. ACM
    Idziorek J, Tannian M and Jacobson D Detecting fraudulent use of cloud resources Proceedings of the 3rd ACM workshop on Cloud computing security workshop, (61-72)
  299. Fortiş T, Lopez G, Cruz I, Ferschl G and Máhr T Cloud patterns for mOSAIC-Enabled scientific applications Proceedings of the 2011 international conference on Parallel Processing, (83-93)
  300. Weng Y and Zhao S The legal challenges of networked robotics Proceedings of the 25th IVR Congress conference on AI Approaches to the Complexity of Legal Systems: models and ethical challenges for legal systems, legal language and legal ontologies, argumentation and software agents, (61-72)
  301. Groß S and Schill A Towards user centric data governance and control in the cloud Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security, (132-144)
  302. ACM
    Takahashi T, Kadobayashi Y and Fujiwara H Ontological approach toward cybersecurity in cloud computing Proceedings of the 3rd international conference on Security of information and networks, (100-109)
  303. Gang H, Yan H and Xu L Secure Image Deduplication in Cloud Storage Information and Communication Technology, (243-251)
Contributors
  • National Institute of Standards and Technology
  • National Institute of Standards and Technology
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations