233 | -- | 235 | Haider Abbas, Olaf Maennel, Saïd Assar. Security and privacy issues in cloud computing |
237 | -- | 252 | Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya. Service resizing for quick DDoS mitigation in cloud computing environment |
253 | -- | 264 | Rooh ul Amin, Irum Inayat, Basit Shahzad, Kashif Saleem, Aijun Li. An empirical study on acceptance of secure healthcare service in Malaysia, Pakistan, and Saudi Arabia: a mobile cloud computing perspective |
265 | -- | 282 | Ashfaq Hussain Farooqi, Farrukh Aslam Khan. Securing wireless sensor networks for improved performance in cloud-based environments |
283 | -- | 295 | Yunchuan Sun, Lei Wu, Shizhong Wu, Shoupeng Li, Tao Zhang, Li Zhang, Junfeng Xu, Yongping Xiong, Xuegang Cui. Attacks and countermeasures in the internet of vehicles |
297 | -- | 305 | Laisen Nie, Dingde Jiang, Zhihan Lv. Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks |
307 | -- | 323 | Faria Mehak, Rahat Masood, Muhammad Awais Shibli, Islam Elgedway. EACF: extensible access control framework for cloud environments |
325 | -- | 333 | Nasir Raza, Imran Rashid, Fazeel Ali Awan. Security and management framework for an organization operating in cloud environment |
335 | -- | 345 | Yaser Jararweh, Mahmoud Al-Ayyoub, Lo'ai Tawalbeh, Ala Darabseh, Houbing Song. Software-defined systems support for secure cloud computing based on data classification |
347 | -- | 357 | Ayo Gbadeyan, Sergey Butakov, Shaun Aghili. IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider |
359 | -- | 370 | Yang Lu, Gang Wang, Jiguo Li, Jian Shen. Efficient designated server identity-based encryption with conjunctive keyword search |
371 | -- | 384 | Wiem Abderrahim, Zièd Choukair. The three-dimensional model for dependability integration in cloud computing |