Professional (11)6, p. 57.
Miller, K. (2010)
“Ethical Analysis in the Cloud,” IT Professional (12)6, p. 7.
Miller, K., and J. Voas (2010)
“Ethics and the Cloud,” IT Professional (12)5, p. 4.
Milojicic, D., I.M. Llorente, and R.S. Montero (2011)
“OpenNebula: A Cloud Management Tool,” IEEE Internet
Computing (15)2, pp. 11
–14.
Misra, S.C., and A. Mondal (2011)
“Identification of a Company’s Suitability for the Adoption of Cloud Computing and
Modelling Its Corresponding Return on Investment,
” Mathematical and Computer Modelling (53)3–4, pp. 504–
521, doi: 10.1016/j.mcm.2010.03.037.
Mitrani, I. (2010)
“Management of Server Farms for Performance and Profit,” The Computer Journal (53)7, p. 1038.
Moreno
–Vozmediano, R., R.S. Montero, and I.M. Llorente (2011) “Multicloud Deployment of Computing Clusters for
Loosely Coupled MTC Applications,
” Parallel and Distributed Systems, IEEE Transactions (22)6, pp. 924–930.
Murphy, M.A., and S. Goasguen (2010)
“Virtual Organization Clusters: Self-provisioned Clouds on the Grid,” Future
Generation Computer Systems (26)8, pp. 1271
–1281, doi: 10.1016/j.future.2010.02.011.
Naghshineh, M., R. Ratnaparkhi, D. Dillenberger, J.R. Doran, C. Dorai, L. Anderson, et al. (2009)
“IBM Research
Division Cloud Computing Initiative,
” IBM Journal of Research and Development (53)4, pp. 1:1–1:10.
Navonil, M. (2010)
“Exploiting Grid Computing, Desktop Grids and Cloud Computing for e-Science,” Transforming
Government: People, Process and Policy (4)4, p. 288.
Nelson, M.R. (2009)
“Building an Open Cloud,” Science (324)5935, p. 1656.
Nevin, R. (2009)
“Supporting 21st Century Learning Through Google Apps,” Teacher Librarian (37)2, p. 35.
Ngai, E.W.T., and F.K.T. Wat (2002)
“A Literature Review and Classification of Electronic Commerce Research,”
Information & Management (39)5, pp. 415
–429, doi: 10.1016/S0378-7206(01)00107-0.
Nicolae, B., G. Antoniu, L. Bougé, D. Moise, and A. Carpen
–Amarie (2011) “BlobSeer: Next-generation Data
Management for Large Scale Infrastructures,
” Journal of Parallel and Distributed Computing (71)2, pp. 169–
184, doi: 10.1016/j.jpdc.2010.08.004.
Nurmi, D., R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, et al. (2009)
“The Eucalyptus Open-source
Cloud-computing System,
” Paper presented at the Cluster Computing and the Grid, 2009, CCGRID ’09, 9th
IEEE/ACM International Symposium, Shanghai, China.
Owens, D. (2010)
“Securing Elasticity in the Cloud,” Communications of the ACM (53)6, p. 46.
Owunwanne, D., and R. Goel (2010)
“Radio Frequency Identification (RFID) Technology: Gaining A Competitive
Value Through Cloud Computing,
” International Journal of Management and Information Systems (14)5, p.
157.
Pallis, G. (2010)
“Cloud Computing: The New Frontier of Internet Computing,” IEEE Internet Computing (14)5, p. 70.
Palmer, B., K. Bubendorfer, and I. Welch (2010)
“A Protocol for Verification of an Auction Without Revealing Bid
Values,
” Procedia Computer Science (1)1, pp. 2649–2658, doi: 10.1016/j.procs.2010.04.298.
Pamies
–Juarez, L., P. García–López, M. Sánchez–Artigas, and B. Herrera (2011) “Towards the Design of Optimal
Data Redundancy Schemes for Heterogeneous Cloud Storage Infrastructures,
” Computer Networks (55)5, p.
1100.
Pandey, S., W. Voorsluys, S. Niu, A. Khandoker, and R. Buyya (2011)
“An Autonomic Cloud Environment for
Hosting ECG Data Analysis Services,
” Future Generation Computer Systems(28)1, pp. 147-154, doi:
10.1016/j.future.2011.04.022.
56
Volume 31
Article 2
Paquette, S., P.T. Jaeger, and S.C. Wilson (2010)
“Identifying the Security Risks Associated with Governmental Use
of Cloud Computing,
” Government Information Quarterly (27)3, pp. 245–253, doi: 10.1016/j.giq.2010.01.002.
Parakh, A., and S. Kak (2009)
“Online Data Storage Using Implicit Security,” Information Sciences, (179)19, pp.
3323-3331.
Pauley, W.A. (2010)
“Cloud Provider Transparency: An Empirical Evaluation,” IEEE Security & Privacy (8)6, pp. 32–
39.
Pendyala, V.S., and S.S.Y. Shim (2009)
“The Web as the Ubiquitous Computer,” Computer (42)9, pp. 90–92.
Peterson, G. (2010)
“Don’t Trust. And Verify: A Security Architecture Stack for the Cloud,” IEEE Security & Privacy
(8)5, 83
–86.
Petter, S., and E.R. McLean (2009)
“A Meta-analytic Assessment of the Delone and Mclean IS Success Model: An
Examination of IS Success at the Individual Level,
” Information & Management (46)3, pp. 159–166.
Plummer, D.C., D.M. Smith, T.J. Bittman, D.W. Cearley, D.J. Cappuccio, D. Scott, et al. (2009)
“Five Refining
Attributes of Public and Private Cloud Computing,
”
http://www.gartner.com/DisplayDocument?doc_cd=
67182&ref=g_fromdoc
(current Apr. 24, 2010).
Preston, R. (2011)
“Top 10 CIO Priorities,” Information Week, Oct. 20,
http://www.informationweek.com/news/global-
cio/interviews/231901248
(current Oct. 25, 2011).
Ramakrishnan, L., J.S. Chase, D. Gannon, D. Nurmi, and R. Wolski (2011)
“Deadline-sensitive Workflow
Orchestration Without Explicit Resource Control,
” Journal of Parallel and Distributed Computing (71)3, pp.
343
–353, doi: 10.1016/j.jpdc.2010.11.010.
Robert, F. (2009)
“Library in the Clouds,” OCLC Systems and Services (25)3, p. 156.
Robey, F., and M.L. Markus (1998)
“Beyond Rigor and Relevance: Producing Consumable Research About
Information Systems,
” Information Resources Management Journal (11)1, pp. 7–15.
Rochwerger, B., D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, et al. (2011)
“Reservoir―When One Cloud Is
Not Enough,
” Computer (44)3, pp. 44–51.
Rodero
–Merino, L., L.M. Vaquero, V. Gil, F. Galán, J. Fontán, R.S. Montero, et al. (2010) “From Infrastructure
Delivery to Service Management in Clouds,
” Future Generation Computer Systems (26)8, pp. 1226–1240, doi:
10.1016/j.future.2010.02.013.
Ryan, M. (2011)
“Viewpoint Cloud Computing Privacy Concerns on Our Doorstep,” Communications of the ACM
(54)1, p. 36.
Sabherwal, R., A. Jeyaraj, and C. Chowa (2006)
“Information System Success: Individual and Organizational
Determinants,
” Management Science (52)12, p. 1849.
Schaffer, H. (2009)
“X as a Service, Cloud Computing, and the Need for Good Judgment,” IT Professional (11)5, p.
4.
Scornavacca, E., S.J. Barnes, and S.L. Huff (2006)
“Mobile Business Research Published in 2000–2004:
Emergence, Current Status, and Future Opportunities,
” Communications of the Association for Information
Systems (17) Article 28, pp. 635
–646.
Sharif, A.M. (2010)
“It’s Written in the Cloud: The Hype and Promise of Cloud Computing,” Journal of Enterprise
Do'stlaringiz bilan baham: |