Author:
Subhash Ligade Sunil,Udayakumar R.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference28 articles.
1. Opeyemi, O., Shuo, C., Zheng, Y., Rongxing, L., Choo, K.-K. R., & Dlodlo, M. (2017). From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access, 5, 8284–8300.
2. Ning, J., Cao, Z., Dong, X., Liang, K., Ma, H., & Wei, L. (2017). Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing”. IEEE Transactions on Information Forensics and Security, 13(1), 94–105.
3. Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. pp. 800–144.
4. Mell, P., & Grance, T. (2009). The NIST definition of cloud computing. National Institute of standards and Technology, vol. 53, no. 6.
5. Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46–61.
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献