Author:
Mishra Ph.D. Kamta Nath,Pandey Ph.D. Subhash Chandra
Publisher
Springer Nature Switzerland
Reference68 articles.
1. Albeshri A Caelli W (2010) Mutual protection in a cloud computing environment, 12th IEEE international conference on high-performance computing and communications (HPCC), pp. 641–646
2. Sedigh A, Radhakrishnan K, Campbell CE-A, Singh D (2014) Trust Evaluation of the Current Security Measures Against Key Network Attacks. MAGNT Res Report 2(4):161–171
3. Alger D (June 2005) Build the best data Center Facility for Your Business. Cisco Press Book, Indianapolis, USA
4. Buyya R, Yeo CS, Venugopal S (2008) Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities, In Proceedings of the 10th IEEE international conference on high-performance computing and communications (HPCC 2008, IEEE CS Press, Los Alamitos, CA, USA), Dalian, China, September 25-27, pp. 1–9
5. Khodadadi F, Calheiros RN, Buyya R (2015) A data-centric framework for development and deployment of internet of things applications in clouds, Proceedings of the 10th IEEE international conference on intelligent sensors, sensor networks and information processing (ISSNIP 2015), Singapore, April 7–9, pp. 1–6