


default search action
International Journal of Web and Grid Services, Volume 13
Volume 13, Number 1, 2017
- Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim, Junyoung Park, Kangbin Yim:

Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment. 3-24 - Xu An Wang

, Fatos Xhafa, Jianfeng Ma, Yunfei Cao, Dianhua Tang:
Reusable garbled gates for new fully homomorphic encryption service. 25-48 - Santi Caballé, Jorge Miguel, Fatos Xhafa, Nicola Capuano

, Jordi Conesa:
Using trustworthy web services for secure e-assessment in collaborative learning grids. 49-74 - Xiang-Wei Zheng, Bin Hu, Dianjie Lu, Zhen-hua Chen, Hong Liu:

Energy-efficient virtual network embedding in networks for cloud computing. 75-93 - Hsing-Chung Chen:

A negotiation-based cooperative RBAC scheme. 94-111 - Jingling Zhao, Shilei Chen, Mengchen Cao, Baojiang Cui:

Malware algorithm classification method based on big data analysis. 112-130 - Admir Barolli, Donald Elmazi

, Ryoichiro Obukata, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Experimental results of a Raspberry Pi and OLSR based wireless content centric network testbed: comparison of different platforms. 131-141
Volume 13, Number 2, 2017
- Tomoya Enokido, Dilawaer Doulikun, Makoto Takizawa:

An energy-aware load balancing algorithm to perform computation type application processes in a cluster of servers. 145-169 - Jiyoung Lim, Inshil Doh, Kijoon Chae:

Secure and structured IoT smart grid system management. 170-185 - Baojiang Cui, Xiaodan Yan:

A review of data management and protocols for vehicular networks. 186-206 - Jun Yang, Pengpeng Yang, Ziyue Wang, Jianbin Li:

Enhanced secure low-level reader protocol based on session key update mechanism for RFID in IoT. 207-227 - Tetsuya Oda, Keita Matsuo, Leonard Barolli, Masafumi Yamada, Yi Liu:

Design and implementation of an IoT-based e-learning testbed. 228-241
Volume 13, Number 3, 2017
- Xu An Wang

, Jianfeng Ma, Fatos Xhafa, Baodong Qin, Mingwu Zhang:
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service. 246-269 - Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:

TrDup: enhancing secure data deduplication with user traceability in cloud computing. 270-289 - Saif ul Islam

, Nadeem Javaid
, Jean-Marc Pierson
:
A novel utilisation-aware energy consumption model for content distribution networks. 290-314 - Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa
:
Sensitivity-based synchronisation protocol to prevent illegal information flow among objects. 315-333 - Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk Ruth Lee:

ATMSim: a Hadoop and self-similarity-based simulator for collecting, detecting, measuring and analysing anomalous traffic. 334-350 - Kun Ma, Bo Yang:

Stream-based live entity resolution approach with adaptive duplicate count strategy. 351-373
Volume 13, Number 4, 2017
- Abel Carrión, Miguel Caballer, Ignacio Blanquer, Nelson Kotowski, Rodrigo Jardim, Alberto M. R. Dávila:

Managing workflows on top of a cloud computing orchestrator for using heterogeneous environments on e-Science. 375-402 - Guobing Zou, Wang Li, Zhimin Zhou, Sen Niu, Yanglan Gan, Bofeng Zhang:

Clustering-based uncertain QoS prediction of web services via collaborative filtering. 403-424 - Yan Guo, Shangguang Wang, Kok-Seng Wong, Myung Ho Kim:

Skyline service selection approach based on QoS prediction. 425-447 - Chi-Yi Lin, Ying-Chen Lin:

An overall approach to achieve load balancing for Hadoop Distributed File System. 448-466

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














