A Model for Mobile Agent based Security in Cloud Computing
Abstract
Keywords
Full Text:
PDFReferences
“ABusiness Per-spective on Technology and Applications” by K. Stanoevska-Slabeva, T.Wozniak, GridandCloudComputing- Springe r-Verlag, Berlin, Heidelberg,2010.
G. Reese, Cloud Application Architectures: Building Applications and Infras-tructure in the Cloud, in: Theory in Practice, O‟Reilly Media, 2009.
B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems (2009).
“A Matchmaking Algorithm For Resource Discovery On Grid” by Md Rafiqul Islam, Md Zahidul Islam, Nazia Leyla in International Conference On Information And Communication Technology Icict 2007, 7-9 March 2007, Dhaka, Bangladesh.
Cloud Security Alliance. Top Threats To Cloud Computing, 2010. Http://Www.Cloudsecurityalliance.Org [Accessed On: March, [2010].
Heiser J. What You Need To Know About Cloud Computing Security And Compliance, Gartner, Research, Id Number: G00168345, 2009.
“Resource Matching And A Matchmaking Service For An Intelligent Grid” by xin bai, han yu, yongchang ji, and dan c. marinescu in international journal of computing intelligence 1:3,summer 2005.
E. Naone, Technology overview, conjuring clouds, MIT Technology Review, July–August, 2009.
National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009.
Michael Knapik And Jay Jo-Hnson,Developing Intelligent Agents For Distributed Sys-Tems: Exploring Architectures, Techniques, And Applications, Mcgraw-Hill Professional Publishing, 1997.
Joseph P Bigus, Jennifer Bi-Gus And Joe Bigus, Construct-Ing Intelligent Agents Using Java: Professional Develo-Per‟s Guide, 2nd Edition, John Wiley & Sons, 2001.
William R Cockayne And Mi-Chael Zyda, Mobile Agents, Prentice Hall, 1998.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.