Journal: IJGUC

Volume 4, Issue 4

219 -- 230Mikhail Nesterenko, Sébastien Tixeuil. Ideal stabilisation
231 -- 241Timothy M. Lynar, Simon, Ric D. Herbert, William J. Chivers. Reducing energy consumption in distributed computing through economic resource allocation
242 -- 254Qingni Shen, Yahui Yang, Zhonghai Wu, Dandan Wang, Min Long. Securing data services: a security architecture design for private storage cloud based on HDFS
255 -- 264Peng Xiao, Ning Han. Improving user QoS by relaxing resource reservation policy in high-performance grid environments
265 -- 277Ronald Petrlic, Stephan Sekula, Christoph Sorge. A privacy-friendly architecture for future cloud computing
278 -- 292Ray Carroll, Sasitharan Balasubramaniam, Junichi Suzuki, Chonho Lee, William Donnelly, Dmitri Botvich. Bio-inspired service management framework: green data-centres case study

Volume 4, Issue 2/3

95 -- 102Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu. Access control requirements for structured document in cloud computing
103 -- 109Zhonghong Sun. Fairness in the presence of semi-rational parties in rational two-party secure computation
110 -- 118Alessandro Barenghi, Gerardo Pelosi, Federico Terraneo. Secure and efficient design of software block cipher implementations on microcontrollers
119 -- 127Wazir Zada Khan, Mohamad Naufal bin Mohamad Saad, Mohammed Y. Aalsalem. Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
128 -- 133Yichun Liu. Fairness analysis of e-commerce protocols based on strand spaces
134 -- 143Siwei Peng, Baojiang Cui, Ru Jia, Shurui Liang, Yi-Ying Zhang. A novel vulnerability detection method for ZigBee MAC layer
144 -- 150Xudong Zhu, Hui Li, Feng Hua Li. Privacy-preserving logistic regression outsourcing in cloud computing
151 -- 159Changji Wang, Wentao Li. An efficient attribute-based signature scheme with claim-predicate mechanism
160 -- 168Xinfeng Ye, Bakh Khoussainov. Fine-grained access control for cloud computing
169 -- 177Shamsul Kamal Ahmad Khalid, Mustafa Mat Deris, Kamaruddin Malik Mohamad. Anti-cropping digital image watermarking using Sudoku
178 -- 186Jinson Zhang, Mao Lin Huang, Doan Hoang. Visual analytics for intrusion detection in spam emails
187 -- 196Sujuan Li, Futai Zhang. Leakage-resilient identity-based encryption scheme
197 -- 203Yuanyuan Zhang, Marine Minier. How network coding system constrains packet pollution attacks in wireless sensor networks
204 -- 211Guangye Sui, Mohamed Mejri. FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test
212 -- 218Jie Zhang, Futai Zhang. Linear threshold verifiable secret sharing in bilinear groups

Volume 4, Issue 1

1 -- 9ByungRae Cha, JongWon Kim 0001. Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments
10 -- 20Yona Raekow, Christian Simmendinger, Domenic Jenz, Piotr Grabowski. On-demand software licence provisioning in grid and cloud computing
21 -- 39Cristian Lai, Claude Moulin. Semantic indexing modelling of resources within a distributed system
40 -- 46Jinfeng Yang, Rong Cheng, Wenming Liu, Yong Xiao, Fangguo Zhang. Cryptoanalysis and improvement of smart prepayment meter protocol in standard Q/GDW 365
47 -- 59Roman Kopetzky, Markus Günther, Natalia Kryvinska, Andreas Mladenow, Christine Strauss, Christian Stummer. Strategic management of disruptive technologies: a practical framework in the context of voice services and of computing towards the cloud
60 -- 69Peng Xiao, Dongbo Liu, Xilong Qu. Resource co-allocation framework based on hybrid gaming model in grid environments
70 -- 84Sergio Nesmachnow, Santiago Iturriaga. Multiobjective grid scheduling using a domain decomposition based parallel micro evolutionary algorithm
85 -- 93Fei Yan, Xiaofeng Chen 0001, Yinghui Zhang. Efficient online/offline signcryption without key exposure