Vol 2, No 2 (2014)

Table of Contents

Vol 2, No 2 (2014)

Open Access Open Access  Restricted Access Subscription Access

Articles

SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter
Surinder Singh Khurana, Nirmaljeet Kaur
 Vol 2, No 2 (2014), Pagination: 1-6
ABSTRACT |  PDF     Abstract Views: 171  |  PDF Views: 1
A Survey on Cloud Computing and Cloud Security
Rohit Handa
 Vol 2, No 2 (2014), Pagination: 7-18
ABSTRACT |  PDF     Abstract Views: 260  |  PDF Views: 1
Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool
Hazem A. Elbaz, Mohammed H. Abd-Elaziz, Taymoor M. Nazmy
 Vol 2, No 2 (2014), Pagination: 19-25
ABSTRACT |  PDF     Abstract Views: 233  |  PDF Views: 1
Cloud Based Information Management System Model for Rural Health Care in India
Kalpana Chaudhari, P. T. Karule
 Vol 2, No 2 (2014), Pagination: 26-31
ABSTRACT |  PDF     Abstract Views: 246  |  PDF Views: 1
A Security Aware User Access Privileges in Cloud through Fuzzy Reasoning Approach
R. Poorvadevi, S. Rajalakshmi
 Vol 2, No 2 (2014), Pagination: 32-36
ABSTRACT |  PDF     Abstract Views: 252  |  PDF Views: 1