Academic literature on the topic 'Cloud Computing ; Cloud Security ; Cloud'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud Computing ; Cloud Security ; Cloud.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cloud Computing ; Cloud Security ; Cloud"

1

Mouli, K. Chandra, and U. Seshadri. "Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (2013): 1539–45. http://dx.doi.org/10.24297/ijct.v10i4.3254.

Full text
Abstract:
Now a day Cloud Computing is rapidly using computing technology. For low cost and high-end benefits this cloud computing is utilized. The major issue in this cloud computing is Ensuring the security, because the often store sensitive data with third party cloudproviders but these providers may beuntrusted.Working with single cloud is prevented, because in customer’s perception the failure in service availability and thepossibility of viciousgang in single cloud. To overcome these types of failures, a recent and popular technology is emerged called cloud of clouds or multi clouds or inters cl
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Ji Yi, Qian Li Shen, Jian Lin Zhang, and Qi Xie. "Cloud Computing: Cloud Security to Trusted Cloud." Advanced Materials Research 186 (January 2011): 596–600. http://dx.doi.org/10.4028/www.scientific.net/amr.186.596.

Full text
Abstract:
Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions in the field were pointed out. It’s will be a new trend for the cloud computing and trusted computing technology to integrate..
APA, Harvard, Vancouver, ISO, and other styles
3

Mathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.

Full text
Abstract:
The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and qui
APA, Harvard, Vancouver, ISO, and other styles
5

Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security Issues for Cloud Computing." International Journal of Information Security and Privacy 4, no. 2 (2010): 36–48. http://dx.doi.org/10.4018/jisp.2010040103.

Full text
Abstract:
In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud. Next, the paper will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, the authors discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.

Full text
Abstract:
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved i
APA, Harvard, Vancouver, ISO, and other styles
7

Beckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.

Full text
Abstract:
Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud computing. In this work, we presented a two-tier architecture for security in mul
APA, Harvard, Vancouver, ISO, and other styles
8

Xie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.

Full text
Abstract:
Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.
APA, Harvard, Vancouver, ISO, and other styles
9

Shyam, Gopal K., and Mir Abdul Samim Ansari. "Security Concerns in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (2018): 2296–301. http://dx.doi.org/10.31142/ijtsrd18306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

D, Mahalakshmi, and Mrs T. Sathiyabama. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 881–83. http://dx.doi.org/10.31142/ijtsrd18674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cloud Computing ; Cloud Security ; Cloud"

1

Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.

Full text
Abstract:
Ces dernières années, nous assistons à une immense révolution numérique de l’internet où de nombreuses applications, innovantes telles que l’internet des objets, les voitures autonomes, etc., ont émergé. Par conséquent, l’adoption des technologies d’externalisations des données, telles que le cloud ou le fog computing, afin de gérer cette expansion technologique semble inévitable. Cependant, l’utilisation du cloud ou du fog computing en tant que plateforme d’externalisation pour le stockage ou le partage des données crée plusieurs défis scientifiques. En effet, externaliser ses données signifi
APA, Harvard, Vancouver, ISO, and other styles
2

Lounis, Ahmed. "Security in cloud computing." Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP1945/document.

Full text
Abstract:
Le Cloud Computing, ou informatique en nuages, est un environnement de stockage et d’exécution flexible et dynamique qui offre à ses utilisateurs des ressources informatiques à la demande via internet. Le Cloud Computing se développe de manière exponentielle car il offre de nombreux avantages rendus possibles grâce aux évolutions majeures des Data Centers et de la virtualisation. Cependant, la sécurité est un frein majeur à l’adoption du Cloud car les données et les traitements seront externalisés hors de site de confiance de client. Cette thèse contribue à résoudre les défis et les issues de
APA, Harvard, Vancouver, ISO, and other styles
3

Doelitzscher, Frank. "Security audit compliance for cloud computing." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3005.

Full text
Abstract:
Cloud computing has grown largely over the past three years and is widely popular amongst today's IT landscape. In a comparative study between 250 IT decision makers of UK companies they said, that they already use cloud services for 61% of their systems. Cloud vendors promise "infinite scalability and resources" combined with on-demand access from everywhere. This lets cloud users quickly forget, that there is still a real IT infrastructure behind a cloud. Due to virtualization and multi-tenancy the complexity of these infrastructures is even increased compared to traditional data c
APA, Harvard, Vancouver, ISO, and other styles
4

Win, Thu Yein. "Virtualisation security in cloud computing." Thesis, Glasgow Caledonian University, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.726791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blakstad, Kåre Marius, and Mats Andreassen. "Security in Cloud Computing : A Security Assessment of Cloud Computing Providers for an Online Receipt Storage." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21041.

Full text
Abstract:
Considerations with regards to security issues and demands must be addressed before migrating an application into a cloud computing environment. Different vendors, Microsoft Azure, Amazon Web Services and Google AppEngine, provide different capabilities and solutions to the individual areas of concern presented by each application. Through a case study of an online receipt storage application from the company dSafe, a basis is formed for the evaluation. The three cloud computing vendors are assessed with regards to a security assessment framework provided by the Cloud Security Alliance and the
APA, Harvard, Vancouver, ISO, and other styles
6

Cornejo-Ramirez, Mario. "Security for the cloud." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE049/document.

Full text
Abstract:
La cryptographie a été un facteur clé pour permettre la vente de services et du commerce par Internet. Le cloud computing a amplifié cette révolution et est devenu un service très demandé grâce à ses avantages comme : puissance de calcul importante, services à bas coûts, rendement, évolutivité, accessibilité et disponibilité. Parallèlement à la hausse de nouveaux business, des protocoles pour des calculs sécurisés ont aussi émergé. Le but de cette thèse est de contribuer à la sécurité des protocoles d’Internet existants en fournissant une analyse de la source aléatoire de ces protocoles et en
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Min. "Privacy Protection on Cloud Computing." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.

Full text
Abstract:
Cloud is becoming the most popular computing infrastructure because it can attract more and more traditional companies due to flexibility and cost-effectiveness. However, privacy concern is the major issue that prevents users from deploying on public clouds. My research focuses on protecting user's privacy in cloud computing. I will present a hardware-based and a migration-based approach to protect user's privacy. The root cause of the privacy problem is current cloud privilege design gives too much power to cloud providers. Once the control virtual machine (installed by cloud providers) is co
APA, Harvard, Vancouver, ISO, and other styles
8

Brahim, Kamel. "Cloud Computing:Accountability." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3164/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ambrose, William, Samuel Athley, and Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.

Full text
Abstract:
<p>With Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concepts by focusing on security risks with Cloud Computing and the associated services; Software, Platform and Infrastructure (SPI) and connecting them with a social study of trust.</p><p>The method that was conducted during our research was reviewing secondary literature, interviewing different experts regarding Cloud Computing and relating standards already established by ENISA, NIST, and CSA to the i
APA, Harvard, Vancouver, ISO, and other styles
10

Inam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.

Full text
Abstract:
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero &amp; Llorente, 2012). A distinctive cloud is affected by different security issues such as Temporary Denial of Service (TDOS) attacks, user identity theft, session hijacking issues and flashing attacks (Danish, 2011). The pur
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cloud Computing ; Cloud Security ; Cloud"

1

Vacca, John R., ed. Cloud Computing Security. CRC Press, 2016. http://dx.doi.org/10.1201/9781315372112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48671-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48674-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00021-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Zhiqiu, Xingming Sun, Junzhou Luo, and Jian Wang, eds. Cloud Computing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27051-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cloud Computing ; Cloud Security ; Cloud"

1

Sehgal, Naresh Kumar, and Pramod Chandra P. Bhatt. "Cloud Computing and Information Security." In Cloud Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77839-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Samarati, Pierangela, and Sabrina De Capitani di Vimercati. "Cloud Security." In Encyclopedia of Cloud Computing. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Morrow, Susan. "Data Security in the Cloud." In Cloud Computing. John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9780470940105.ch23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lele, Ajey. "Cloud Computing." In Disruptive Technologies for the Militaries and Security. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3384-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martin, John Paul, Vipin Singh, K. Chandrasekaran, and A. Kandasamy. "Explicating Fog Computing Key Research Challenges and Solutions." In Cloud Security. CRC Press, 2021. http://dx.doi.org/10.1201/9780367821555-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schiefer, Gunther, Andreas Oberweis, Murat Citak, and Andreas Schoknecht. "Security-by-Design in der Cloud-Anwendungsentwicklung." In Cloud Computing. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-20967-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Yushu, Yong Xiang, and Leo Yu Zhang. "Cloud Computing Security." In SpringerBriefs in Electrical and Computer Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2523-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Srinivasan, S. "Cloud Computing Security." In SpringerBriefs in Electrical and Computer Engineering. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-7699-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Campbell, Tony. "Cloud Computing Security." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Massonet, Philippe, Syed Naqvi, Francesco Tusa, Massimo Villari, and Joseph Latanicki. "Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures." In Cloud Computing. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12636-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cloud Computing ; Cloud Security ; Cloud"

1

Zhang Yandong and Zhang Yongsheng. "Cloud computing and cloud security challenges." In 2012 International Symposium on Information Technology in Medicine and Education (ITME 2012). IEEE, 2012. http://dx.doi.org/10.1109/itime.2012.6291488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jia, Minrui. "Cloud Security of Cloud Computing Application." In 2011 International Conference on Control, Automation and Systems Engineering (CASE). IEEE, 2011. http://dx.doi.org/10.1109/iccase.2011.5997643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jensen, Meiko, Jorg Schwenk, Jens-Matthias Bohli, Nils Gruschka, and Luigi Lo Iacono. "Security Prospects through Cloud Computing by Adopting Multiple Clouds." In 2011 IEEE 4th International Conference on Cloud Computing (CLOUD). IEEE, 2011. http://dx.doi.org/10.1109/cloud.2011.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bordak, Lukas. "Cloud Computing Security." In 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2019. http://dx.doi.org/10.1109/iceta48886.2019.9040043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

AlZain, Mohammed A., Eric Pardede, Ben Soh, and James A. Thom. "Cloud Computing Security: From Single to Multi-clouds." In 2012 45th Hawaii International Conference on System Sciences (HICSS). IEEE, 2012. http://dx.doi.org/10.1109/hicss.2012.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Shaohe, Cuenyun Jiang, and Ruxin Wang. "Cloud computing and cloud security in China." In ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II: Proceedings of the 2nd International Conference on Advances in Materials, Machinery, Electronics (AMME 2018). Author(s), 2018. http://dx.doi.org/10.1063/1.5033711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Cloud computing." In 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Almorsy, Mohemed, John Grundy, and Amani S. Ibrahim. "Collaboration-Based Cloud Computing Security Management Framework." In 2011 IEEE 4th International Conference on Cloud Computing (CLOUD). IEEE, 2011. http://dx.doi.org/10.1109/cloud.2011.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Francia, Guillermo, Chia-Tien D. Lo, Kai Qian, Ming Yang, and Xiaolin Hu. "Learning Cloud Computing and Cloud Security By Simulation." In Power and Energy. ACTAPRESS, 2013. http://dx.doi.org/10.2316/p.2013.808-019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sui, Xin, and Yi Sui. "A Survey of Cloud Computing and Cloud Security." In Proceedings of the 2018 8th International Conference on Management, Education and Information (MEICI 2018). Atlantis Press, 2018. http://dx.doi.org/10.2991/meici-18.2018.55.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cloud Computing ; Cloud Security ; Cloud"

1

Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. Security Issues for Cloud Computing. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada545053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Myers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Myers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jansen, W., and T. Grance. Guidelines on security and privacy in public cloud computing. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Akyol, Bora A. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1052949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Takai, Teresa M. Cloud Computing Strategy. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada563989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Seybold, Patricia. Cloud Computing in 2015. Patricia Seybold Group, 2013. http://dx.doi.org/10.1571/ta12-13-13cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Anya, and Ira S. Moskowitz. Incentivized Cloud Computing: A Principal Agent Solution to the Cloud Computing Dilemma. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada530441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hochstein, Lorin. High Performance Computing (HPC) Innovation Service Portal Pilots Cloud Computing (HPC-ISP Pilot Cloud Computing). Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada549202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Amoroso, Edward. Cloud Security for Everyone. River Publishers, 2017. http://dx.doi.org/10.13052/popcas017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!