Advances on cloud services and cloud computing

被引:10
作者
Barolli, Leonard [1 ]
Chen, Xiaofeng [2 ]
Xhafa, Fatos [3 ]
机构
[1] Fukuoka Inst Technol, Dept Informat & Commun Engn, Higashi Ku, 3-30-1 Wajiro Higashi, Fukuoka 8110295, Japan
[2] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[3] Univ Politecn Cataluna, ES-08034 Barcelona, Spain
关键词
D O I
10.1002/cpe.3414
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:1985 / 1987
页数:3
相关论文
共 12 条
[1]   Emerging trends and technologies in big data processing [J].
Casado, Ruben ;
Younas, Muhammad .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :2078-2091
[2]   Obfuscation for multi-use re-encryption and its application in cloud computing [J].
Cheng, Rong ;
Zhang, Fangguo .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :2170-2190
[3]   Semantic client-side approach for web personalization of SaaS-based cloud services [J].
Fan, Haolong ;
Hussain, Farookh Khadeer ;
Hussain, Omar Khadeer .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :2144-2169
[4]   Modeling security requirements for cloud-based system development [J].
Ficco, Massimo ;
Palmieri, Francesco ;
Castiglione, Aniello .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :2107-2124
[5]   Ontology as a Service (OaaS): extending sub-ontologies on the cloud [J].
Flahive, Andrew ;
Taniar, David ;
Rahayu, Wenny .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :2028-2040
[6]   Performance of optimized link state routing protocol for video streaming application in vehicular ad-hoc networks cloud computing [J].
Ikeda, Makoto ;
Honda, Taiki ;
Barolli, Leonard .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :2054-2063
[7]   Performance analysis of bidirectional cloud networks with imperfect channel state information [J].
Li, Jing ;
Wu, Mingying ;
Ge, Jianhua ;
Zhang, Chensi ;
Pop, Florin ;
Wang, Yingguan .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :2092-2106
[8]   A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds [J].
Liang, Kaitai ;
Fang, Liming ;
Wong, Duncan S. ;
Susilo, Willy .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :2004-2027
[9]   An auditing mechanism for the security of service in grid [J].
Liu, Zhusong ;
Li, Zhike ;
Sun, Sheng ;
Li, Yunfa .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :2041-2053
[10]   A massive data processing approach for effective trustworthiness in online learning groups [J].
Miguel, Jorge ;
Caballe, Santi ;
Xhafa, Fatos ;
Prieto, Josep .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) :1988-2003