1 |
A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing |
2 |
Using Crowdsourcing to Provide QoS for Mobile Cloud Computing |
3 |
Towards Achieving Data Security with the Cloud Computing Adoption Framework |
4 |
A Combinatorial Auction mechanism for multiple resource procurement in cloud computing |
5 |
Online Resource Scheduling Under Concave Pricing for Cloud Computing |
6 |
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing |
7 |
Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing |
8 |
A Context-Aware Architecture Supporting Service Availability in Mobile Cloud Computing |
9 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
10 |
Fair Resource Allocation for Data-Intensive Computing in the Cloud |
11 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
12 |
Knowledge-Based Resource Allocation for Collaborative Simulation Development in a Multi-tenant Cloud Computing Environment |
13 |
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage |
14 |
A Trust Label System for Communicating Trust in Cloud Services |
15 |
Towards Trustworthy Multi-Cloud Services Communities: A Trust-based Hedonic Coalitional Game |
16 |
Cost Effective, Reliable and Secure Workflow Deployment over Federated Clouds |
17 |
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud |
18 |
Cloud workflow scheduling with deadlines and time slot availability |
19 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
20 |
SecRBAC: Secure data in the Clouds |
21 |
Joint Energy Minimization and Resource Allocation in C-RAN with Mobile Cloud |
22 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
23 |
Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud |
24 |
Collective Energy-Efficiency Approach to Data Center Networks Planning |
25 |
Middleware-oriented Deployment Automation for Cloud Applications |
26 |
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm |
27 |
Providing User Security Guarantees in Public Infrastructure Clouds |
28 |
Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services |
29 |
Cloud Service Reliability Enhancement via Virtual Machine Placement Optimization |
30 |
A Novel Statistical Cost Model and an Algorithm for Efficient Application Offloading to Clouds |
31 |
Packet Cloud: A Cloudlet-Based Open Platform for In-Network Services |
32 |
A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds |
33 |
Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems |
34 |
Effective Modelling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload |
35 |
An Energy-Efficient VM Prediction and Migration Framework for Overcommitted Clouds |
36 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
37 |
A Cloud Gaming System Based on User-Level Virtualization and Its Resource Scheduling |
38 |
Optimal Joint Scheduling and Cloud Offloading for Mobile Applications |
39 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
40 |
A Taxonomy of Job Scheduling on Distributed Computing Systems |
41 |
LazyCtrl: A Scalable Hybrid Network Control Plane Design for Cloud Data Centers |
42 |
Ensemble: A Tool for Performance Modeling of Applications in Cloud Data Centers |
43 |
AutoElastic: Automatic Resource Elasticity for High Performance Applications in the Cloud |
44 |
Supporting Multi Data Stores Applications in Cloud Environments |
45 |
Coral: A Cloud-Backed Frugal File System |
46 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
47 |
EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud |
48 |
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
49 |
Risk Assessment in a Sensor Cloud Framework Using Attack Graphs |
50 |
Rep Cloud: Attesting to Cloud Service Dependency |
51 |
Poris: A Scheduler for Parallel Soft Real-Time Applications in Virtualized Environments |
52 |
Cost Minimization Algorithms for Data Center Management |