Journal: J. Comput. Syst. Sci.

Volume 80, Issue 8

1491 -- 1492Yang Xiang, Ivan Stojmenovic, Peter Mueller. Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems
1493 -- 1503Hua Wang, Lili Sun, Elisa Bertino. Building access control policy model for privacy preserving and testing policy conflicting problems
1504 -- 1517Ahmed Sallam, Kenli Li, Aijia Ouyang, Zhiyong Li 0001. Proactive workload management in dynamic virtualized environments
1518 -- 1533Lan Zhou, Vijay Varadharajan, Michael Hitchens. Secure administration of cryptographic role-based access control for large-scale cloud storage systems
1534 -- 1548Zhide Chen, Cheng Qiao, Yihui Qiu, Li Xu, Wei Wu. Dynamics stability in wireless sensor networks active defense model
1549 -- 1562Guiyi Wei, Rongxing Lu, Jun Shao. EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
1563 -- 1583Chi Yang, Xuyun Zhang, Changmin Zhong, Chang Liu, Jian Pei, Kotagiri Ramamohanarao, Jinjun Chen. A spatiotemporal compression based approach for efficient big data processing on Cloud
1584 -- 1596Younchan Jung, Enrique Festijo. One-time packet key exchange scheme for secure real-time multimedia applications
1597 -- 1614Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez. De-anonymization attack on geolocated data