International Journal of Cloud Applications and Computing (IJCAC)
2011 - 2026
Current editor(s): B. B. Gupta From IGI Global Scientific Publishing Bibliographic data for series maintained by Journal Editor (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 8, issue 4, 2018
- A Context-Aware Museum-Guide System Based on Cloud Computing pp. 1-19

- Hamed Vahdat-Nejad, Mohammad Sadeq Navabi and Hosein Khosravi-Mahmouei
- An Improved Genetic Algorithm for Document Clustering on the Cloud pp. 20-28

- Ruksana Akter and Yoojin Chung
- Assignment of Virtual Networks to Substrate Network for Software Defined Networks pp. 29-48

- Ali Akbar Nasiri and Farnaz Derakhshan
- An Analysis of the Factors Affecting the Adoption of Cloud Computing in Higher Educational Institutions: A Developing Country Perspective pp. 49-71

- Ali Tarhini, Khamis Al-Gharbi, Ali Al-Badi and Yousuf Salim AlHinai
- KIET Framework for Cloud Adoption: Indian Banking Case Study pp. 72-87

- Lalit Mohan Sanagavarapu, Gangadharan G.R. and Raghu Reddy Y.
- Quantifying the Resilience of Cloud-Based Manufacturing Composite Services pp. 88-117

- Mohammad Reza Namjoo, Abbas Keramati, S. Ali Torabi and Fariborz Jolai
- A New Conception of Load Balancing in Cloud Computing Using Tasks Classification Levels pp. 118-133

- Fahim Youssef, Ben Lahmar El Habib, Rahhali Hamza, Labriji El Houssine, Eddaoui Ahmed and Mostafa Hanoune
Volume 8, issue 3, 2018
- Fault Tolerant and Optimal Task Clustering for Scientific Workflow in Cloud pp. 1-19

- Nagaraj V. Dharwadkar, Shivananda R. Poojara and Priyanka M. Kadam
- Efficient Fault Tolerance on Cloud Environments pp. 20-31

- Sam Goundar and Akashdeep Bhardwaj
- A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE pp. 32-47

- Cheng Li, Zhiyong Zhang and Lanfang Zhang
- Performance Evaluation of Unstructured PBRA for Bigdata with Cassandra and MongoDB in Cloud pp. 48-59

- Sangeeta Gupta
- An Efficient Data Replication Algorithm for Distributed Systems pp. 60-77

- Sanjaya Kumar Panda and Saswati Naik
- Cost Effective Approaches for Content Placement in Cloud CDN Using Dynamic Content Delivery Model pp. 78-117

- S. Sajitha Banu and S.R. Balasundaram
Volume 8, issue 2, 2018
- On the Exploration of Equal Length Cellular Automata Rules Targeting a MapReduce Design in Cloud pp. 1-26

- Arnab Mitra, Anirban Kundu, Matangini Chattopadhyay and Samiran Chattopadhyay
- An Affordable Hybrid Cloud Based Cluster for Secure Health Informatics Research pp. 27-46

- Basit Qureshi
- Architectural Design of Trusted Platform for IaaS Cloud Computing pp. 47-65

- Ubaidullah Alias Kashif, Zulfiqar Ali Memon, Shafaq Siddiqui, Abdul Rasheed Balouch and Rakhi Batra
- An Autonomic SLA Monitoring Framework Managed by Trusted Third Party in the Cloud Computing pp. 66-95

- Adil Maarouf, Youssef Mifrah, Abderrahim Marzouk and Abdelkrim Haqiq
- An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms pp. 96-112

- Ammar Almomani, Mohammad Alauthman, Firas Albalas, O. Dorgham and Atef Obeidat
- Secure NoSQL for the Social Networking and E-Commerce Based Bigdata Applications Deployed in Cloud pp. 113-129

- Sangeeta Gupta and Narsimha Gugulothu
Volume 8, issue 1, 2018
- Towards a Better Understanding of Ubiquitous Cloud Computing pp. 1-20

- Hamed Vahdat-Nejad, Shaghayegh Ostadi Eilaki and Shaghayegh Izadpanah
- Assessment of Honeypots: Issues, Challenges and Future Directions pp. 21-54

- B. B. Gupta and Alisha Gupta
- A Novel Security Framework for Managing Android Permissions Using Blockchain Technology pp. 55-79

- Abdellah Ouaguid, Noreddine Abghour and Mohammed Ouzzif
- On the Performance Evaluation of IaaS Cloud Services With System-Level Benchmarks pp. 80-96

- Sanjay P. Ahuja and Niharika Deval
- Cloud Computing Adoption: Scale Development, Measurement and Validation pp. 97-116

- Pragati Priyadarshinee
- Energy-Efficient Task Consolidation for Cloud Data Center pp. 117-142

- Sudhansu Shekhar Patra
- A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing pp. 143-153

- Hoon Ko, Libor Mesicek, Jongsun Choi, Junho Choi and Seogchan Hwang
- Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud pp. 154-172

- O. Dorgham, Banan Al-Rahamneh, Ammar Almomani, Moh'd Al-Hadidi and Khalaf F. Khatatneh
Volume 7, issue 4, 2017
- The Impact of Cloud-Based Digital Transformation on IT Service Providers: Evidence From Focus Groups pp. 1-19

- Trevor Clohessy, Thomas Acton and Lorraine Morgan
- An Energy-Aware Task Scheduling in the Cloud Computing Using a Hybrid Cultural and Ant Colony Optimization Algorithm pp. 20-40

- Poopak Azad and Nima Jafari Navimipour
- Verification and Identification Approach to Maintain MVCC in Cloud Computing pp. 41-59

- Niharika Singh, Upasana Lakhina, Ajay Jangra and Priyanka Jangra
- A Heuristic Approach for Service Allocation in Cloud Computing pp. 60-74

- Ahmad Sharieh and Layla Albdour
Volume 7, issue 3, 2017
- Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges pp. 1-43

- Shashank Gupta and B. B. Gupta
- Attitudes Towards Cloud Computing Adoption in Emerging Economies pp. 44-58

- Mohammad Alsharo
- Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks pp. 59-75

- Akashdeep Bhardwaj and Sam Goundar
- Comparative Study for Different Provisioning Policies for Load Balancing in Cloudsim pp. 76-86

- Layla Albdour
Volume 7, issue 2, 2017
- User Modeling Approach for Dyslexic Students in Virtual Learning Environments pp. 1-9

- Fatima Ezzahra Benmarrakchi, Jamal El Kafi and Ali Elhore
- An Efficient All Shapes Busy List Processor Allocation Algorithm for 3D Mesh Multicomputers pp. 10-26

- Saad Bani-Mohammad
- Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment pp. 27-40

- Mouhib Ibtihal, El Ouadghiri Driss and Naanani Hassan
- Countering MitM Attacks Using Evolved PathFinder Algorithm pp. 41-61

- Mouhcine Chliah, Ghizlane Orhanou and Said El Hajji
- Secure Mobile Multi Cloud Architecture for Authentication and Data Storage pp. 62-76

- Karim Zkik, Ghizlane Orhanou and Said El Hajji
Volume 7, issue 1, 2017
- Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud pp. 1-31

- B. B. Gupta, Shashank Gupta and Pooja Chaudhary
- Pedagogical Indexed Arabic Text in Cloud E-Learning System pp. 32-46

- Nafaa Haffar, Mohsen Maraoui, Shadi Aljawarneh, Mohammed Bouhorma, Abdallah Altahan Alnuaimi and Bilal Hawashin
- XML OLAP Cube in the Cloud Towards the DWaaS pp. 47-56

- Rihane Dkaich, Ikram EL Azami and Abdelaziz Mouloudi
- Parallel and Distributed Population based Feature Selection Framework for Health Monitoring pp. 57-71

- Naoual El Aboudi and Laila Benhlima
- Performance Evaluation of Public IaaS Clouds for Web 2.0 Applications Using CloudStone Benchmark pp. 72-93

- Sanjay P. Ahuja and Neha Soni
Volume 6, issue 4, 2016
- A Customer-Oriented Task Scheduling for Heterogeneous Multi-Cloud Environment pp. 1-17

- Sohan Kumar Pande, Sanjaya Kumar Panda and Satyabrata Das
- A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule pp. 18-35

- Partha Ghosh, Shivam Shakti and Santanu Phadikar
- NoSQL Application Redesign may be Unnecessary for Most Corporation Cloud Migration Deployments pp. 36-64

- Curtis J. Muller and Aaron Christopher Davis
- COBIT Evaluation as a Framework for Cloud Computing Governance pp. 65-82

- Yassine Bounagui, Hatim Hafiddi and Abdellatif Mezrioui
- Designing a Framework for Cloud Service Agreement for Cloud Environments pp. 83-96

- Akashdeep Bhardwaj and Sam Goundar
- A Secured Real Time Scheduling Model for Cloud Hypervisor pp. 97-110

- Rekha Kashyap and Deo Prakash Vidyarthi
Volume 6, issue 3, 2016
- Healthcare SaaS Based on a Data Model with Built-In Security and Privacy pp. 1-14

- Ruchika Asija and Rajarathnam Nallusamy
- Enhanced Trust Path between Two Entities in Cloud Computing Environment pp. 15-31

- Usha Divakarla and K. Chandrasekaran
- A Security Framework for Secure Cloud Computing Environments pp. 32-44

- Mouna Jouini and Latifa Ben Arfa Rabai
- Investigating the Determinants of IT Professionals' Intention to Use Cloud-Based Applications and Solutions: An Extension of the Technology Acceptance pp. 45-62

- Sabah Al-Somali and Hanan Baghabra
Volume 6, issue 2, 2016
- Detection and Ignoring of Blackhole Attack in Vanets Networks pp. 1-10

- Chaima Bensaid, Sofiane Boukli Hacene and Kamel Mohamed Faraoun
- A Based-Rule Method to Transform CIM to PIM into MDA pp. 11-24

- Yassine Rhazali, Youssef Hadi and Abdelaziz Mouloudi
- An Improved Secure SIP Registration Mechanism to Avoid VoIP Threats pp. 25-36

- Mohammed Rasol, Bassam Al Kasasbeh and Farah Al Adwan
- A Practical Application of TrimCloud: Using TrimCloud as an Educational Technology in Developing Countries pp. 37-48

- Beatriz Adriana Gomez and Kailash Evans
- Applying the Updated Delone and Mclean is Success Model for Enterprise Cloud Computing Readiness pp. 49-54

- Omar Sabri
- A Generic, Multi-Period and Multi-Partner Cost Optimizing Model for Cloud-Based Supply Chain pp. 55-63

- Goknur Arzu Akyuz and Mohammad Rehan
- A Satiated Method for Cloud Traffic Classification in Software Defined Network Environment pp. 64-79

- Mohit Mathur, Mamta Madan and Kavita Chaudhary
Volume 6, issue 1, 2016
- Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack pp. 1-14

- Nitin Nagar and Ugrasen Suman
- A Game Theoretic Method for Resource Allocation in Scientific Cloud pp. 15-41

- Amin Nezarat and Gh Dastghaibifard
- Testing Software Services in Cloud Ecosystems pp. 42-58

- Mariam Kiran and Anthony Simons
- A Survey on MapReduce Implementations pp. 59-87

- Amer Al-Badarneh, Amr Mohammad and Salah Harb
| |