Skip to content

Advertisement

Journal of Cloud Computing

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Articles

Sort by
Page 6 of 7
  1. Content type: Research

    The Architecture, Engineering & Construction (AEC) sector is a highly fragmented, data intensive, project based industry, involving a number of very different professions and organisations. Projects carried ou...

    Authors: Thomas H Beach, Omer F Rana, Yacine Rezgui and Manish Parashar

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2013 2:8

    Published on:

  2. Content type: Research

    Urban flood risk modelling is a highly topical example of intensive computational processing. Such processing is increasingly required by a range of organisations including local government, engineering consul...

    Authors: Vassilis Glenis, Andrew Stephen McGough, Vedrana Kutija, Chris Kilsby and Simon Woodman

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2013 2:7

    Published on:

  3. Content type: Research

    The performance of Cloud systems is a key concern, but has typically been assessed by the comparison of relatively few Cloud systems, and often on the basis of just one or two features of performance. In this ...

    Authors: Lee Gillam, Bin Li, John O’Loughlin and Anuz Pratap Singh Tomar

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2013 2:6

    Published on:

  4. Content type: Research

    Data management and sharing is the challenge being faced by all the IT majors today. Adds over it, is the challenge faced by the cloud service providers in terms of multi-tenancy of data and its efficient retr...

    Authors: Sanjeev Kumar Pippal and Dharmender Singh Kushwaha

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2013 2:5

    Published on:

  5. Content type: Research

    We describe the research undertaken in the six month JISC/EPSRC funded My Private Cloud project, in which we built a demonstration cloud file storage service that allows users to login to it, by using their ex...

    Authors: David W Chadwick, Matteo Casenove and Kristy Siu

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2013 2:3

    Published on:

  6. Content type: Research

    The aim of this paper is to propose the use of a cloud-based integrity management service coupled with a trustworthy client component – in the form of the Trust Extension Device (TED) platform – as a means to to ...

    Authors: John Zic and Thomas Hardjono

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2013 2:4

    Published on:

  7. Content type: Research

    In this paper we report upon the cloud-based solution that we designed and implemented for space situational awareness. We begin by introducing the background to the work and to the area of space situational a...

    Authors: Steven J Johnston, Neil S O’Brien, Hugh G Lewis, Elizabeth E Hart, Adam White and Simon J Cox

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2013 2:2

    Published on:

  8. Content type: Research

    With the growing popularity of cloud-based data centres as the enterprise IT platform of choice, there is a need for effective management strategies capable of maintaining performance within SLA and QoS parame...

    Authors: Ernest Sithole, Aaron McConnell, Sally McClean, Gerard Parr, Bryan Scotney, Adrian Moore and Dave Bustard

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2013 2:1

    Published on:

  9. Content type: Research

    Cloud computing takes away much of the need to plan future IT demands from the consumer, and puts it in the hands of the provider. Consumers don’t need to give advance notice to start or terminate virtual mach...

    Authors: Owen Rogers and Dave Cliff

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:21

    Published on:

  10. Content type: Review

    Cloud computing offers massively scalable, elastic resources (e.g., data, computing power, and services) over the internet from remote data centres to the consumers. The growing market penetration, with an eve...

    Authors: Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries and Max Mühlhäuser

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:19

    Published on:

  11. Content type: Editorial

    Autonomic Computing introduces autonomy in software systems by making them capable of self- management and self-healing. Autonomic Clouds have emerged as a result of the application of autonomic techniques to ...

    Authors: Nick Antonopoulos, Ashiq Anjum and Lee Gillam

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:18

    Published on:

  12. Content type: Research

    This article presents an approach to handle compromised components in the OpenStack Infrastructure-as-a-Service cloud environment. We present two specific use cases; a compromised service process and the intro...

    Authors: Aryan TaheriMonfared and Martin Gilje Jaatun

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:16

    Published on:

  13. Content type: Editorial

    This special issue presents extended and revised versions of distinguished papers presented at the security & privacy track of the 3rd IEEE International Conference on Cloud Computing Technology and Science (I...

    Authors: Martin Gilje Jaatun, Costas Lambrinoudakis and Chunming Rong

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:17

    Published on:

  14. Content type: Research

    With looming patent cliffs, resulting in no patent protections for several block buster drugs, several Life sciences organizations are looking at ways to reduce the costs of drug discovery. They are looking to...

    Authors: Vikas Saxena, Shyam Kumar Doddavula and Akansha Jain

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:14

    Published on:

  15. Content type: Research

    This article describes how a Redundant Array of Independent Net-storages (RAIN) can be deployed for confidentiality control in Cloud Computing. The RAIN approach splits data into segments and distributes segme...

    Authors: Martin Gilje Jaatun, Gansen Zhao, Athanasios V Vasilakos, Åsmund Ahlmann Nyre, Stian Alapnes and Yong Tang

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:13

    Published on:

  16. Content type: Research

    A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software on remote resources. Giving full superuser permission...

    Authors: Roland Schwarzkopf, Matthias Schmidt, Christian Strack, Simon Martin and Bernd Freisleben

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:12

    Published on:

  17. Content type: Research

    Classic intrusion detection mechanisms are not flexible enough to cope with cloud specific characteristics such as frequent infrastructure changes. This makes them unable to address new cloud specific security...

    Authors: Frank Doelitzscher, Christoph Reich, Martin Knahl, Alexander Passfall and Nathan Clarke

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:9

    Published on:

  18. Content type: Research

    The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cl...

    Authors: Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund and Makan Pourzandi

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:11

    Published on:

  19. Content type: Research

    In context-aware systems, the contextual information about human and computing situations has a strong temporal aspect i.e. it remains valid for a period of time. This temporal property can be exploited in cac...

    Authors: Saad Liaquat Kiani, Ashiq Anjum, Nick Antonopoulos, Kamran Munir and Richard McClatchey

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:7

    Published on:

  20. Content type: Research

    Recommender systems use, amongst others, a mechanism called collaborative filtering (CF) to predict the rating that a user will give to an item given the ratings of other items provided by other users. While r...

    Authors: Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos and Srijith K Nair

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:8

    Published on:

  21. Content type: Research

    Increasingly infrastructure providers are supplying the cloud marketplace with storage and on-demand compute resources to host cloud applications. From an application user’s point of view, it is desirable to i...

    Authors: Peter Wright, Yih Leong Sun, Terence Harmer, Anthony Keenan, Alan Stewart and Ronald Perrott

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:6

    Published on:

  22. Content type: Research

    Cloud computing data centres, due to their housing of powerful ICT equipment, are high energy consumers and therefore accountable for large quantities of emissions. Therefore, energy saving strategies applicab...

    Authors: Robert Basmadjian, Hermann De Meer, Ricardo Lent and Giovanni Giuliani

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:5

    Published on:

Page 6 of 7

2017 Journal Metrics

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. 

Learn more here

.

Advertisement