Search Results

There are 59271 results for: content related to: Security risk assessment framework for cloud computing environments

  1. What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data

    American Business Law Journal

    Volume 50, Issue 2, Summer 2013, Pages: 413–482, Nancy J. King and V.T. Raja

    Article first published online : 28 MAY 2013, DOI: 10.1111/ablj.12012

  2. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

    Security and Communication Networks

    Keke Gai, Meikang Qiu, Lixin Tao and Yongxin Zhu

    Article first published online : 11 FEB 2015, DOI: 10.1002/sec.1224

  3. Data Security in the Cloud

    Cloud Computing: Principles and Paradigms

    Rajkumar Buyya, James Broberg, Andrzej Goscinski, Pages: 573–592, 2011

    Published Online : 3 JAN 2011, DOI: 10.1002/9780470940105.ch23

  4. A service-oriented taxonomical spectrum, cloudy challenges and opportunities of cloud computing

    International Journal of Communication Systems

    Volume 25, Issue 6, June 2012, Pages: 796–819, Bhaskar Prasad Rimal and Eunmi Choi

    Article first published online : 12 MAY 2011, DOI: 10.1002/dac.1279

  5. Market-Oriented Cloud Computing and The Cloudbus Toolkit

    Large Scale Network-Centric Distributed Systems

    Rajkumar Buyya, Suraj Pandey, Christian Vecchiola, Pages: 319–358, 2013

    Published Online : 25 OCT 2013, DOI: 10.1002/9781118640708.ch14

  6. Classifying different denial-of-service attacks in cloud computing using rule-based learning

    Security and Communication Networks

    Volume 5, Issue 11, November 2012, Pages: 1235–1247, Md Tanzim Khorshed, A B M Shawkat Ali and Saleh A. Wasimi

    Article first published online : 27 SEP 2012, DOI: 10.1002/sec.621

  7. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms

    Software: Practice and Experience

    Volume 41, Issue 1, January 2011, Pages: 23–50, Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose and Rajkumar Buyya

    Article first published online : 24 AUG 2010, DOI: 10.1002/spe.995

  8. Opportunities and Challenges Provided by Cloud Repositories for Bioinformatics-Enabled Drug Discovery

    Drug Development Research

    Volume 75, Issue 6, September 2014, Pages: 393–401, Gratien Dalpé and Yann Joly

    Article first published online : 4 SEP 2014, DOI: 10.1002/ddr.21211

  9. Servitization of the IT Industry: The Cloud Phenomenon

    Strategic Change

    Volume 23, Issue 5-6, August 2014, Pages: 375–388, Nabil Sultan

    Article first published online : 19 AUG 2014, DOI: 10.1002/jsc.1983

  10. Government Cloud Computing and National Data Sovereignty

    Policy & Internet

    Volume 4, Issue 3-4, December 2012, Pages: 40–71, Kristina Irion

    Article first published online : 23 JAN 2013, DOI: 10.1002/poi3.10

  11. International Consumer Attitudes Toward Cloud Computing: A Social Cognitive Theory and Technology Acceptance Model Perspective

    Thunderbird International Business Review

    Volume 57, Issue 3, May/June 2015, Pages: 217–228, Vanessa Ratten

    Article first published online : 27 FEB 2015, DOI: 10.1002/tie.21692

  12. A secure re-encryption scheme for data services in a cloud computing environment

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 17, 10 December 2015, Pages: 4573–4585, Lizhi Xiong, Zhengquan Xu and Yanyan Xu

    Article first published online : 23 JAN 2015, DOI: 10.1002/cpe.3423

  13. Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems

    Systems Engineering

    Volume 15, Issue 2, Summer 2012, Pages: 213–224, Yacov Y. Haimes and Clyde C. Chittister

    Article first published online : 9 FEB 2012, DOI: 10.1002/sys.20204

  14. Green Cloud Computing and Environmental Sustainability

    Harnessing Green It: Principles and Practices

    Saurabh Kumar, Rajkumar Buyya, Pages: 315–339, 2012

    Published Online : 4 SEP 2012, DOI: 10.1002/9781118305393.ch16

  15. An overview of insider attacks in cloud computing

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 12, 25 August 2015, Pages: 2964–2981, Adrian Duncan, Sadie Creese and Michael Goldsmith

    Article first published online : 21 MAR 2014, DOI: 10.1002/cpe.3243

  16. Cloud Computing Strategies and Risks

    Straight to the Top: CIO Leadership in a Mobile, Social, and Cloud-Based World, Second Edition

    Gregory S. Smith, Pages: 125–153, 2013

    Published Online : 11 APR 2013, DOI: 10.1002/9781118634226.ch7

  17. Data privacy breach prevention framework for the cloud service

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 982–1005, Chandramohan Dhasarathan, Vengattaraman Thirumal and Dhavachelvan Ponnurangam

    Article first published online : 15 JUN 2014, DOI: 10.1002/sec.1054

  18. Multimedia Applications and Security in MapReduce: Opportunities and Challenges

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 17, 10 December 2012, Pages: 2083–2101, Zhiwei Yu, Chaokun Wang, Clark Thomborson, Jianmin Wang, Shiguo Lian and Athanasios V. Vasilakos

    Article first published online : 7 OCT 2011, DOI: 10.1002/cpe.1846

  19. Design of secure access control scheme for personal health record-based cloud healthcare service

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1332–1346, Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1087

  20. General-purpose computation on GPUs for high performance cloud computing

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 12, 25 August 2013, Pages: 1628–1642, Roberto R. Expósito, Guillermo L. Taboada, Sabela Ramos, Juan Touriño and Ramón Doallo

    Article first published online : 15 MAY 2012, DOI: 10.1002/cpe.2845