International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
Cloud computing offers flexible and scalable IT (Information Technology) services for which many organizations are now interested in harnessing its benefit. In spite of the enthusiasm and great interest, Cloud computing has not yet earned full trust of the individual customers, banks, armed forces,...
| Main Authors: | Mohammed, Mohssen M. Z. E., Pathan, Al-Sakib Khan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/39957/ http://irep.iium.edu.my/39957/2/20141204-v1-Full-Program.pdf http://irep.iium.edu.my/39957/6/Published-7646a571.pdf http://irep.iium.edu.my/39957/9/39957_International%20center%20for%20monitoring%20cloud%20computing_Scopus.pdf |
Similar Items
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Response time for cloud computing providers
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Risk assessment for Big Data in cloud computing: trust as an impact
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Sierpinski triangle based data-center network architecture in cloud computing / Qi Han
by: Qi, Han
Published: (2016)
by: Qi, Han
Published: (2016)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Emerging sensor-cloud technology for pervasive services and applications
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Cloud Computing Model for MyGRANTs Project
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
Cloud computing in Malaysia Universities
by: Razak, Siti Fatimah Abdul
Published: (2009)
by: Razak, Siti Fatimah Abdul
Published: (2009)
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
by: Naha, Ranesh Kumar
Published: (2015)
by: Naha, Ranesh Kumar
Published: (2015)
Impatient job scheduling under cloud computing
by: Mahdi, Nawfal A.
Published: (2012)
by: Mahdi, Nawfal A.
Published: (2012)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
SLA-based trust model for secure cloud computing
by: Alhamad, Mohammed
Published: (2011)
by: Alhamad, Mohammed
Published: (2011)
Conceptual SLA Framework for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Quality of service model for software as a service in cloud computing from users' and providers' perspectives
by: Khanjani, Atieh
Published: (2015)
by: Khanjani, Atieh
Published: (2015)
Cloud Computing Delivery and Delivery Models: Opportunity and Challenges
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
An optimal tasks scheduling algorithm based on QoS in cloud computing network
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
by: Alhakimi, Mohammed Ameen Mohammed Abdo
Published: (2017)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
A case study on the adoption of cloud computing in Malaysia from the perspectives of cloud providers
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
A case study on the adoption of cloud computing in Malaysia from the perspectives of cloud providers
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
Integration of logistics and cloud computing service providers: cost and green benefits in the Chinese context
by: Subramanian, Nachiappan, et al.
Published: (2014)
by: Subramanian, Nachiappan, et al.
Published: (2014)
A survey on SLA and performance measurement in cloud computing
by: Alhamad, Mohammed, et al.
Published: (2011)
by: Alhamad, Mohammed, et al.
Published: (2011)
Self-healing framework for service level agreement monitoring and violation reacting in cloud computing
by: Mosallanejad, Ahmad
Published: (2014)
by: Mosallanejad, Ahmad
Published: (2014)
Similar Items
-
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015) -
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015) -
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013) -
Response time for cloud computing providers
by: Alhamad, Mohammed, et al.
Published: (2010) -
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)