default search action
Search dblp for Publications
export results for "toc:db/journals/ijcac/ijcac6.bht:"
@article{DBLP:journals/ijcac/AkyuzR16, author = {Goknur Arzu Akyuz and Mohammad Rehan}, title = {A Generic, Multi-Period and Multi-Partner Cost Optimizing Model for Cloud-Based Supply Chain}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {2}, pages = {55--63}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016040106}, doi = {10.4018/IJCAC.2016040106}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/AkyuzR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/Al-BadarnehMH16, author = {Amer Al{-}Badarneh and Amr Mohammad and Salah Harb}, title = {A Survey on MapReduce Implementations}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {1}, pages = {59--87}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016010104}, doi = {10.4018/IJCAC.2016010104}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcac/Al-BadarnehMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/Al-SomaliB16, author = {Sabah Abdullah Al{-}Somali and Hanan Baghabra}, title = {Investigating the Determinants of {IT} Professionals' Intention to Use Cloud-Based Applications and Solutions: An Extension of the Technology Acceptance}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {3}, pages = {45--62}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016070104}, doi = {10.4018/IJCAC.2016070104}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/Al-SomaliB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/AsijaN16, author = {Ruchika Asija and Rajarathnam Nallusamy}, title = {Healthcare SaaS Based on a Data Model with Built-In Security and Privacy}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {3}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016070101}, doi = {10.4018/IJCAC.2016070101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/AsijaN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/BensaidHF16, author = {Chaima Bensaid and Sofiane Boukli Hacene and Kamel Mohamed Faraoun}, title = {Detection and Ignoring of Blackhole Attack in Vanets Networks}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {2}, pages = {1--10}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016040101}, doi = {10.4018/IJCAC.2016040101}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/BensaidHF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/BhardwajG16, author = {Akashdeep Bhardwaj and Sam Goundar}, title = {Designing a Framework for Cloud Service Agreement for Cloud Environments}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {4}, pages = {83--96}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016100105}, doi = {10.4018/IJCAC.2016100105}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcac/BhardwajG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/BounaguiHM16, author = {Yassine Bounagui and Hatim Hafiddi and Abdellatif Mezrioui}, title = {{COBIT} Evaluation as a Framework for Cloud Computing Governance}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {4}, pages = {65--82}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016100104}, doi = {10.4018/IJCAC.2016100104}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/BounaguiHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/DivakarlaC16, author = {Usha Divakarla and K. Chandrasekaran}, title = {Enhanced Trust Path between Two Entities in Cloud Computing Environment}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {3}, pages = {15--31}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016070102}, doi = {10.4018/IJCAC.2016070102}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/DivakarlaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/GhoshSP16, author = {Partha Ghosh and Shivam Shakti and Santanu Phadikar}, title = {A Cloud Intrusion Detection System Using Novel {PRFCM} Clustering and {KNN} Based Dempster-Shafer Rule}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {4}, pages = {18--35}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016100102}, doi = {10.4018/IJCAC.2016100102}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcac/GhoshSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/GomezE16, author = {Beatriz Adriana Gomez and Kailash Evans}, title = {A Practical Application of TrimCloud: Using TrimCloud as an Educational Technology in Developing Countries}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {2}, pages = {37--48}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016040104}, doi = {10.4018/IJCAC.2016040104}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/GomezE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/JouiniR16, author = {Mouna Jouini and Latifa Ben Arfa Rabai}, title = {A Security Framework for Secure Cloud Computing Environments}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {3}, pages = {32--44}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016070103}, doi = {10.4018/IJCAC.2016070103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcac/JouiniR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/KashyapV16, author = {Rekha Kashyap and Deo Prakash Vidyarthi}, title = {A Secured Real Time Scheduling Model for Cloud Hypervisor}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {4}, pages = {97--110}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016100106}, doi = {10.4018/IJCAC.2016100106}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/KashyapV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/KiranS16, author = {Mariam Kiran and Anthony J. H. Simons}, title = {Testing Software Services in Cloud Ecosystems}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {1}, pages = {42--58}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016010103}, doi = {10.4018/IJCAC.2016010103}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/KiranS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/MathurMC16, author = {Mohit Mathur and Mamta Madan and Kavita Chaudhary}, title = {A Satiated Method for Cloud Traffic Classification in Software Defined Network Environment}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {2}, pages = {64--79}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016040107}, doi = {10.4018/IJCAC.2016040107}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/MathurMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/MullerD16, author = {Curtis J. Muller and Aaron Christopher Davis}, title = {NoSQL Application Redesign may be Unnecessary for Most Corporation Cloud Migration Deployments}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {4}, pages = {36--64}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016100103}, doi = {10.4018/IJCAC.2016100103}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/MullerD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/NagarS16, author = {Nitin Nagar and Ugrasen Suman}, title = {Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from {XSS} Attack}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {1}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016010101}, doi = {10.4018/IJCAC.2016010101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/NagarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/NezaratD16, author = {Amin Nezarat and Gh. Dastghaibifard}, title = {A Game Theoretic Method for Resource Allocation in Scientific Cloud}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {1}, pages = {15--41}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016010102}, doi = {10.4018/IJCAC.2016010102}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/NezaratD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/PandePD16, author = {Sohan Kumar Pande and Sanjaya Kumar Panda and Satyabrata Das}, title = {A Customer-Oriented Task Scheduling for Heterogeneous Multi-Cloud Environment}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {4}, pages = {1--17}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016100101}, doi = {10.4018/IJCAC.2016100101}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/PandePD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/RasolKA16, author = {Mohammed Rasol and Bassam Al Kasasbeh and Farah Al Adwan}, title = {An Improved Secure {SIP} Registration Mechanism to Avoid VoIP Threats}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {2}, pages = {25--36}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016040103}, doi = {10.4018/IJCAC.2016040103}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/RasolKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/RhazaliHM16, author = {Yassine Rhazali and Youssef Hadi and Abdelaziz Mouloudi}, title = {A Based-Rule Method to Transform {CIM} to {PIM} into {MDA}}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {2}, pages = {11--24}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016040102}, doi = {10.4018/IJCAC.2016040102}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/RhazaliHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/Sabri16, author = {Omar Sabri}, title = {Applying the Updated Delone and Mclean is Success Model for Enterprise Cloud Computing Readiness}, journal = {Int. J. Cloud Appl. Comput.}, volume = {6}, number = {2}, pages = {49--54}, year = {2016}, url = {https://doi.org/10.4018/IJCAC.2016040105}, doi = {10.4018/IJCAC.2016040105}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/Sabri16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.