Journal: IEEE Computer

Volume 49, Issue 2

7 -- 8Charles Severance. Bruce Schneier: The Security Mindset
9 -- 0Elisa Bertino. Securing Mobile Applications
12 -- 13Schahram Dustdar. Cloud Computing
14 -- 22Fernando Díaz del Río, Javier Salmerón-Garcia, José Luis Sevillano. Extending Amdahl's Law for the Cloud Computing Era
24 -- 33Alireza Khoshkbarforoushha, Meisong Wang, Rajiv Ranjan, Lizhe Wang, Leila Alem, Samee Ullah Khan, Boualem Benatallah. Dimensions for Evaluating Cloud Resource Orchestration Frameworks
34 -- 45Talal H. Noor, Quan Z. Sheng, Zakaria Maamar, Sherali Zeadally. Managing Trust in the Cloud: State of the Art and Research Challenges
46 -- 52Quan Zhang, Weisong Shi. Energy-Efficient Workload Placement in Enterprise Datacenters
54 -- 62Lei Xu, Chunxiao Jiang, Yan Chen, Jian Wang, Yong Ren. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
63 -- 67Hal Berghel. Secretocracy
68 -- 72Mahmoud Barhamgi, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, Bashar Nuseibeh. Protecting Privacy in the Cloud: Current Practices, Future Directions
74 -- 77Nir Kshetri. Gambling with Source Code
78 -- 79Brian David Johnson, David H. Guston. Futures We Want to Inhabit
80 -- 86Vint Cerf, Max Senges. Taking the Internet to the Next Physical Level
104 -- 0David Alan Grier. The Post-MOOC World