


default search action
IEEE Cloud Computing, Volume 2
Volume 2, Number 1, January - February 2015
- Lee Garber:

In Brief. 4-6 - Mazin Yousif:

The Road Ahead. 8-9 - Joe Weinman:

Cloud Pricing and Markets. 10-13 - Nina Viktoria Juliadotter, Kim-Kwang Raymond Choo

:
Cloud Attack and Risk Assessment Taxonomy. 14-20 - Attila Kertész

:
Interoperable Data Management Using Personal and Infrastructure Clouds. 22-28 - Dan Xu, Xin Liu, Athanasios V. Vasilakos

:
Traffic-Aware Resource Provisioning for Distributed Clouds. 30-39 - Toni Mastelic

, Ivona Brandic
:
Recent Trends in Energy-Efficient Cloud Computing. 40-47 - Lutz Schubert

, Keith G. Jeffery
:
New Software Engineering Requirements in Clouds and Large-Scale Systems. 48-58 - Saeid Abolfazli, Zohreh Sanaei, Ali Tabassi, Steven Rosen, Abdullah Gani

, Samee Ullah Khan
:
Cloud Adoption in Malaysia: Trends, Opportunities, and Challenges. 60-68 - David Bernstein:

Is Amazon Becoming the New Cool Software Company for Developers? 69-71 - Alan Sill

:
Cloud Standards News and Updates. 72-75 - Lizhe Wang

, Rajiv Ranjan
:
Processing Distributed Internet of Things Data in Clouds. 76-80
Volume 2, Number 2, March - April 2015
- Mazin Yousif:

The Rise of Data Capital. 4 - Alan Sill

:
Invention, Innovation, and New APIs. 6-9 - Christopher Millard:

Forced Localization of Cloud Services: Is Privacy the Real Driver? 10-14 - Omer F. Rana

, Joe Weinman:
Data as a Currency and Cloud-Based Data Lockers. 16-20 - Beniamino Di Martino, Giuseppina Cretella, Antonio Esposito

:
Advances in Applications Portability and Services Interoperability among Multiple Clouds. 22-28 - Zahir Tari

, Xun Yi
, Uthpala Subodhani Premarathne, Peter Bertók
, Ibrahim Khalil
:
Security and Privacy in Cloud Computing: Vision, Trends, and Challenges. 30-38 - Mateusz Guzek

, Alicja Gniewek, Pascal Bouvry
, Jedrzej Musial
, Jacek Blazewicz
:
Cloud Brokering: Current Practices and Upcoming Challenges. 40-47 - Igor Leão dos Santos

, Luci Pirmez, Flávia Coimbra Delicato, Samee Ullah Khan
, Albert Y. Zomaya
:
Olympus: The Cloud of Sensors. 48-56 - Xuexiu Chen, Chi Chen

, Yuan Tao, Jiankun Hu
:
A Cloud Security Assessment System Based on Classifying and Grading. 58-67 - Hong Linh Truong, Schahram Dustdar

:
Principles for Engineering IoT Cloud Systems. 68-76 - Surya Nepal

, Rajiv Ranjan
, Kim-Kwang Raymond Choo
:
Trustworthy Processing of Healthcare Big Data in Hybrid Clouds. 78-84
Volume 2, Number 3, May - June 2015
- Mazin Yousif:

Toward "Hypergalactic-Scale" Computing? 5-7 - Alan Sill

:
Socioeconomics of Cloud Standards. 8-11 - James Mitchell:

What's the Best Way to Purchase Cloud Services? 12-15 - Rajiv Ranjan

, Joanna Kolodziej, Lizhe Wang
, Albert Y. Zomaya
:
Cross-Layer Cloud Resource Configuration Selection in the Big Data Era. 16-22 - Claus Pahl

:
Containerization and the PaaS Cloud. 24-31 - Jesus Luna, Neeraj Suri

, Michaela Iorga, Anil Karmel:
Leveraging the Potential of Cloud Security Service-Level Agreements through Standards. 32-40 - Atta ur Rehman Khan

, Mazliza Othman
, Feng Xia
, Abdul Nasir Khan:
Context-Aware Mobile Cloud Computing and Its Challenges. 42-49 - Sanjay Madria, Amartya Sen

:
Offline Risk Assessment of Cloud Service Providers. 50-57 - Soumen Moulik

, Sudip Misra, Mohammad S. Obaidat
:
Smart-Evac: Big Data-Based Decision Making for Emergency Evacuation. 58-65 - Henry Chang:

Privacy Regulatory Model for the Cloud: A Case Study. 67-72
Volume 2, Number 4, July - August 2015
- Mazin Yousif:

Ensuring Legal Protections in the Cloud. 4-5 - Kim-Kwang Raymond Choo

, Rick Sarre
:
Balancing Privacy with Legitimate Surveillance and Lawful Data Access. 8-13 - Constantinos Macropoulos, Keith M. Martin:

Balancing Privacy and Surveillance in the Cloud. 14-21 - Jatinder Singh, Julia E. Powles

, Thomas F. J.-M. Pasquier
, Jean Bacon:
Data Flow Management and Compliance in Cloud Computing. 24-32 - Xuanxia Yao

, Hong Liu, Huansheng Ning
, Laurence T. Yang, Yang Xiang
:
Anonymous Credential-Based Access Control Scheme for Clouds. 34-43 - Charith Perera, Rajiv Ranjan

, Lizhe Wang:
End-to-End Privacy for Open Big Data Markets. 44-53 - Kevin L. Jackson:

IEEE GovCloud: Making A Difference for Global Governments. 54-59 - Quang Do, Ben Martini, Kim-Kwang Raymond Choo

:
A Cloud-Focused Mobile Forensics Methodology. 60-65 - Joe Weinman:

The Strategic Value of the Cloud. 66-70 - Alan Sill

:
Emerging Standards and Organizational Patterns in Cloud Computing. 72-76
Volume 2, Number 5, September - October 2015
- Mazin Yousif:

In Pursuit of Disciplined Execution. 4-5 - K. Selçuk Candan, Christian S. Jensen

, Manish Parashar, Kyung Dong Ryu, Heonyoung Yeom:
Cloud Engineering [Guest editors' introduction]. 6-8 - Stefan Berger, Kenneth A. Goldman, Dimitrios E. Pendarakis, David Safford, Enriquillo Valdez, Mimi Zohar:

Scalable Attestation: A Step toward Secure and Trusted Clouds. 10-18 - Rohit Ranchal, Ajay Mohindra, Justin Manweiler, Bharat K. Bhargava:

RADical Strategies for Engineering Web-Scale Cloud Solutions. 20-29 - John T. Saxon, Behzad Bordbar, Keith Harrison:

Introspecting for RSA Key Material to Assist Intrusion Detection. 30-38 - Joe Weinman:

Intercloudonomics: Quantifying the Value of the Intercloud. 40-47 - Melvin Greer:

FITARA and FedRAMP: Accelerating Federal Cloud Adoption. 48-52 - Wenyi Chen, Anup Mohan, Yung-Hsiang Lu, Thomas J. Hacker, Wei Tsang Ooi

, Edward J. Delp
:
Analysis of Large-Scale Distributed Cameras Using the Cloud. 54-62 - Elisa Bertino, Surya Nepal, Rajiv Ranjan

:
Building Sensor-Based Big Data Cyberinfrastructures. 64-69 - Colette Langos

, Mark Giancaspro:
Does Cloud Storage Lend Itself to Cyberbullying? 70-74 - Alan Sill

:
When to Use Standards-Based APIs (Part 1). 76-80
Volume 2, Number 6, November - December 2015
- Mazin Yousif:

Social Networking Meets the IoT. 4-5 - Weishan Zhang

, Qun Jin, Didier El Baz
:
Enabling the Social Internet of Things and Social Cloud. 6-9 - Dina Hussein, Son N. Han, Gyu Myoung Lee, Noël Crespi:

Social Cloud-Based Cognitive Reasoning for Task-Oriented Recommendation. 10-19 - Ivan Farris, Roberto Girau

, Leonardo Militano, Michele Nitti
, Luigi Atzori, Antonio Iera
, Giacomo Morabito:
Social Virtual Objects in the Edge Cloud. 20-28 - Kyle Chard

, Simon Caton
, Omer F. Rana
, Kris Bubendorfer:
Social Clouds: A Retrospective. 30-40 - He Li

, Mianxiong Dong, Kaoru Ota
:
Radio Access Network Virtualization for the Social Internet of Things. 42-50 - Michaela Iorga, Anil Karmel:

Managing Risk in a Cloud Ecosystem. 51-57 - Roger Clarke

:
Does SaaS Backup Pass the Fitness-for-Purpose Test? 58-63 - Yongwei Wu, Maomeng Su, Weiming Zheng, Kai Hwang, Albert Y. Zomaya

:
Associative Big Data Sharing in Community Clouds: The MeePo Approach. 64-73 - Joe Weinman:

The Cloud and the Economics of the User and Customer Experience. 74-78 - Alan Sill

:
When to Use Standards-Based APIs (Part 2). 80-84 - David S. Linthicum:

The Evolution of Cloud Service Governance. 86-89 - Nick S. Holliman, Paul Watson

:
Scalable Real-Time Visualization Using the Cloud. 90-96

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














