2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)

8-10 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 56
  • Committees

    Publication Year: 2012, Page(s):iv - viii
    Request permission for commercial reuse | PDF file iconPDF (525 KB)
    Freely Available from IEEE
  • Conf. overview and venue

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1164 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2012, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (39 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2012, Page(s):xvii - xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    These keynotes discusses the following: Cloud Computing & Applications; Cloud Collaboration Service-Earning From Cloud; UAE Educational Cloud over ANKABUT; Noisy Neighbors, Isolation and QoS in Cloud Infrastructures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patron & program chair's message

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (104 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICCCTAM-12 schedule

    Publication Year: 2012, Page(s):ix - xii
    Request permission for commercial reuse | PDF file iconPDF (1893 KB)
    Freely Available from IEEE
  • Appendix - A: Sponsors

    Publication Year: 2012, Page(s): 248
    Request permission for commercial reuse | PDF file iconPDF (476 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):xiii - xvi
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Secure Co-resident virtualization in multicore systems by VM pinning and page coloring

    Publication Year: 2012, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1314 KB) | HTML iconHTML

    Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In case of cloud, data from potentially competing sources could reside on the same disk or same memory structure, and a computer process can violate its virtual boundary to access the competitor's data. Current Virtual Machine Monitors (VMMs) used in cloud pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance measure of multi stage scheduling algorithm in cloud computing

    Publication Year: 2012, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    Scheduling user requests in cloud computing for resource provision is key process in cloud computing. In cloud computing sometimes user request has to be processed with a series of virtual machines from the available resources. Each request ri (1<;=i<;=n) in cloud environment has to complete its workflow on a virtual machine of type VM1 for an instance of Ti1 units time, later on a virtual m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of cloud computing using Queuing models

    Publication Year: 2012, Page(s):12 - 15
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    Cloud computing is a new economic computing paradigm in which information and computer resources can be accessed from a Web browser by customers. The process of a job entering into the cloud schedule is generally in the form of queue, so that each user needs to wait until the earlier users are being served. Whenever a new job enters the cloud buffer, the queue length increases so the waiting time.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security & Privacy Architecture as a service for Small and Medium Enterprises

    Publication Year: 2012, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (539 KB) | HTML iconHTML

    This paper focuses on Security and Privacy for Small and Medium Enterprises pertaining to their dependency on small clouds to carry out their business activities. They lack the knowledge pertaining to the security to be applied to safeguard their data and services due to lack of in-house expert technical resources, security architects or less budgets to carry out the vulnerability study for them a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing-aware intercloud scheduler for data-intensive jobs

    Publication Year: 2012, Page(s):22 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (538 KB) | HTML iconHTML

    Cloud computing, a new concept refers to a hosted computational environment that can provide elastic computation and storage services for users per demand. This paradigm arises due to the huge growth in applications and data sizes. Consider the fact that many agencies, organizations and departments are responsible for time-critical tasks and these tasks need to be completed as soon as possible. At... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fine grained access control and flexible revocation scheme for data security on public cloud storage services

    Publication Year: 2012, Page(s):27 - 33
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Cloud computing based storage services have rapidly spread in the market due to their promising capabilities and features. However, the security challenge of outsourcing sensitive data for sharing on the cloud which is not fully controlled by the data owners is still open. In this paper, we present negative and positive attributes in attribute based encryption to support fine grained access contro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of cloud computing for resource sharing in academic libraries

    Publication Year: 2012, Page(s):34 - 37
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB) | HTML iconHTML

    Universities and Colleges are the core of innovation through their advanced research and development. Higher education libraries of different size and type all over the world suffer from common problems such as shrinking budgets, accommodating resources within the budgetary constraints, Countering increased scope of interdisciplinary and multidisciplinary nature of subjects, flexibility associated... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of distributed chess engine using PaaS

    Publication Year: 2012, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    The present day limitation on clock speed of the CPU makes it burdensome to efficiently execute algorithms that require high processing power. This paper brings to picture how distributed systems can be utilized to address such issues, which are limited by the hardware configurations of current-day physical systems. To illustrate the same, the Minimax algorithm is depicted here. The algorithm that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing and deploying a Hospital Management Application in Google cloud and performance study of the application

    Publication Year: 2012, Page(s):43 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2300 KB) | HTML iconHTML

    Web Services are internet enabled software components. By composing web services we can provide integration of Enterprise applications. Web Services are being used extensively by many enterprises like IBM, Microsoft and oracle every day. SOAP and REST are very popular types of web services. A Hospital Management Application is implemented as a web service that can perform functions like online app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of cloud computing in remote oil and gas operations

    Publication Year: 2012, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB) | HTML iconHTML

    This study is based on the various applications that cloud computing finds in petroleum, oil and gas industry. From finding hydrocarbon reserves to their production and conservation as well as feedback collection of efficiency of the said application have been included in the present study. These applications have been touched in detail and their explanations expounded. Some avenues which have sco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ERP on Cloud: Implementation strategies and challenges

    Publication Year: 2012, Page(s):56 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    This paper aims to discuss about the ERP implementation strategies and challenges in a Cloud Environment. ERP is important business software used in all major enterprises and is a useful tool to coordinate the available resources, information and activities to complete the business process. Its importance in an enterprise has led to an increased demand of the ERP software. ERP in CLOUD environment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework of a national level electronic health record system

    Publication Year: 2012, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (745 KB) | HTML iconHTML

    Electronic health is vital for enabling improved access to health records, and boosting the quality of the health services provided. In this paper, a framework for an electronic health record system is to be developed for connecting a nation's health care facilities together in a network using cloud computing technology. Cloud computing ensures easy access to health records from anywhere and at an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on significance of adopting cloud computing paradigm in healthcare sector

    Publication Year: 2012, Page(s):65 - 68
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    Healthcare sector is information critical industry that deals with human lives. Transforming from traditional paper-based to Electronic Health Records (EHRs) was not efficient enough since EHRs require resources, integration, maintenance and high cost implementation. Cloud computing paradigm offers flexible, cost effective, collaborative, multi-tenant infrastructure which assists in transforming e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The need, use and efficiency of trustworthy security model in Cloud computing for information assurance

    Publication Year: 2012, Page(s):69 - 73
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned “on demand”, regardless of the location of user or de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security issues and control mechanisms in Cloud

    Publication Year: 2012, Page(s):74 - 76
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    The responsibility of providing cost-effective, elastic and on-demand access to computing and storage resources lies with the Cloud Service Providers. As for the end-user, it provides an abstraction of reliable and infinite resource availability. Infinite resource availability is based on virtualization technology and availability of a shared pool of computational and storage resources. It is this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.