Introducing IEEE Cloud Computing: A Very Timely Magazine

被引:1
作者
Yousif, Mazin [1 ]
机构
[1] T Syst Int, Frankfurt, Germany
关键词
cloud; distributed systems; SaaS; security;
D O I
10.1109/MCC.2014.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a consumer/delivery model in which IT functions are offered as services, billed based on usage, and accessed with an Internet connection anytime from anywhere. Although cloud technologies have been advanced and adopted at an astonishing pace, much work remains. IEEE Cloud Computing seeks to foster the evolution of cloud computing and provide a forum for reporting original research, exchanging experiences, and developing best practices. © 2014 IEEE.
引用
收藏
页码:4 / 7
页数:4
相关论文
共 50 条
[31]   A Survey of Security in Cloud, Edge, and Fog Computing [J].
Ometov, Aleksandr ;
Molua, Oliver Liombe ;
Komarov, Mikhail ;
Nurmi, Jari .
SENSORS, 2022, 22 (03)
[32]   An access model under cloud computing environment [J].
Gu, Wen ;
Yang, Cao ;
Yi, Ying .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) :328-334
[33]   PUBLIC CLOUD COMPUTING FOR SOFTWARE AS A SERVICE PLATFORMS [J].
Sobon, Michal ;
Nawrocki, Piotr .
COMPUTER SCIENCE-AGH, 2014, 15 (01) :89-103
[34]   ON VIRTUAL MACHINE SECURITY ISSUES IN CLOUD COMPUTING [J].
Zhang, Chaochao ;
Bai, Ling ;
Chen, Su ;
Jiang, Hai .
INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY: PROCEEDINGS, 2012, :75-79
[35]   Security issues and its implication in cloud computing [J].
Nayak, Debabrata .
PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, :3-3
[36]   Reactive and Adaptive Security Monitoring in Cloud Computing [J].
Elbaz, Clement ;
Rilling, Louis ;
Morin, Christine .
2018 IEEE 3RD INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2018, :5-7
[37]   Extending TLS with KMIP protocol for Cloud Computing [J].
Msahli, Mounira ;
Serhrouchni, Ahmed ;
Badra, Mohamed .
2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
[38]   Survivable zero trust for cloud computing environments [J].
Ferretti, Luca ;
Magnanini, Federico ;
Andreolini, Mauro ;
Colajanni, Michele .
COMPUTERS & SECURITY, 2021, 110
[39]   An Overview of Data Security Algorithms in Cloud Computing [J].
Amalarethinam, D. I. George ;
Rajakumari, S. Edel Josephine .
APPLIED INTELLIGENCE AND INFORMATICS, AII 2023, 2024, 2065 :355-367
[40]   Cloud computing architecture [J].
Kim, Won .
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2013, 9 (03) :287-303