


default search action
International Journal of Cloud Applications and Computing, Volume 10
Volume 10, Number 1, 2020
- Sanjay P. Ahuja, Nathan Wheeler:

Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications. 1-10 - Abdelwahhab Satta, Sihem Mostefai:

Strategic Outsourcing to Cloud Computing: A Comprehensive Framework Based on Analytic Hierarchy Process. 11-27 - Praveen Kumar Premkamal

, Syam Kumar Pasupuleti, P. J. A. Alphonse:
Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud. 28-45 - Saswati Sarkar, Anirban Kundu

:
Performance Enhancement of Cloud Based Storage using Disk Scheduling Technique. 46-63 - Shweta Kaushik, Charu Gandhi:

Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing. 64-84
Volume 10, Number 2, 2020
- Muhammad Aliyu

, Murali M., Abdulsalam Ya'u Gital, Souley Boukari:
Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree. 1-21 - Sudipta Sahana

, Tanmoy Mukherjee, Debabrata Sarddar:
A Conceptual Framework Towards Implementing a Cloud-Based Dynamic Load Balancer Using a Weighted Round-Robin Algorithm. 22-35 - Hamid A. Jadad

, Abderezak Touzene
, Khaled Day
:
Offloading as a Service Middleware for Mobile Cloud Apps. 36-55 - K. DeviPriya, Sumalatha Lingamgunta:

Multi Factor Two-way Hash-Based Authentication in Cloud Computing. 56-76 - Sumathi M.

, S. Sangeetha:
Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System. 77-92
Volume 10, Number 3, 2020
- Sanjay P. Ahuja, Emily Czarnecki, Sean Willison:

Multi-Factor Performance Comparison of Amazon Web Services Elastic Compute Cluster and Google Cloud Platform Compute Engine. 1-16 - Ahmad Al Nawasrah, Ammar Ali Almomani

, Samer Atawneh
, Mohammad Alauthman
:
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing. 17-53 - Arun Prasad Mohan

, Mohamed Asfak R., Angelin Gladston:
Merkle Tree and Blockchain-Based Cloud Data Auditing. 54-66 - Ganeshayya Ishwarayya Shidaganti

, Amogh Shreedhar Inamdar, Sindhuja V. Rai, Anagha M. Rajeev:
SCEF: A Model for Prevention of DDoS Attacks From the Cloud. 67-80 - Djouhra Dad, Ghalem Belalem

:
Efficient Strategies of VMs Scheduling Based on Physicals Resources and Temperature Thresholds. 81-95 - Khalid Ali Rababah, Bilal Ali Yaseen Al-Nassar

, Sana'a Nawaf Al-Nsour:
Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan. 96-110
Volume 10, Number 4, 2020
- Ashima Narang

, Deepali Gupta
, Amandeep Kaur
:
Biometrics-Based Un-Locker to Enhance Cloud Security Systems. 1-12 - Ritu Bansal, Vikash Kumar Singh:

Proposed Technique for Efficient Cloud Computing Model in Effective Digital Training Towards Sustainable Livelihoods for Unemployed Youths. 13-27 - Alexander Bogislav Herzfeldt

, Hans Peter Rauer, Reimar Weißbach
, Christoph Ertl
:
Cloud Computing as the Next Utility: Market Strategies for Cloud Service Providers. 28-47 - Acheampong Owusu

:
Determinants of Cloud Business Intelligence Adoption Among Ghanaian SMEs. 48-69 - Boubaker Soltani, Afifa Ghenai, Nadia Zeghib:

Execution of Long-Duration Multi-Cloud Serverless Functions Using Selective Migration-Based Approach. 70-97

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














