2017
DOI: 10.1016/j.jnca.2016.10.008
|View full text |Cite
|
Sign up to set email alerts
|

Federated cloud resource management: Review and discussion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 95 publications
(54 citation statements)
references
References 83 publications
0
53
0
1
Order By: Relevance
“…So, binding methods must be robust and flexible, so that the users can adapt them according to the requirement and situation [33], [37]. a) Physicality: The size and shape of the devices influence on the ways user how users do interaction to bind the group.…”
Section: Factors Affect the Binding Methodsmentioning
confidence: 99%
“…So, binding methods must be robust and flexible, so that the users can adapt them according to the requirement and situation [33], [37]. a) Physicality: The size and shape of the devices influence on the ways user how users do interaction to bind the group.…”
Section: Factors Affect the Binding Methodsmentioning
confidence: 99%
“…The role of application management is creating an application, provisioning the requested services, deploying application data, and starting the application. That is more, application management covers monitoring, scaling, and recovering an application . In Section 5.3.1, the selected application management–based approaches have been analyzed, and in Section 5.3.2, a summary of application management–based approaches have been presented.…”
Section: Classification Of the Selected Approachesmentioning
confidence: 99%
“…That is more, application management covers monitoring, scaling, and recovering an application. 84,85 In Section 5.3.1, the selected application management-based approaches have been analyzed, and in Section 5.3.2, a summary of application management-based approaches have been presented.…”
Section: Application Management-based Approachesmentioning
confidence: 99%
“…The researchers propose several security methods to improve the security level of the transfer data via the online connections. The symmetric and asymmetric data encryption methods are effective to secure the textual plain data [6,7,13]. Although the data encryption is not expensive earthier in time or money, the symmetric and asymmetric is not effective for the large volume data such as images, audio or video.…”
Section: Related Workmentioning
confidence: 99%
“…These factors effect on the selection of the security methods that could be applied to secure the online transfer data. For example, the symmetric or asymmetric encryption techniques are not suitable to encrypt large volume of data, especially the data of images, video, or audio format [6,7]. Hence, the selection of applicable security methods would be decided based on many factors that related to online data transfer.…”
Section: Introductionmentioning
confidence: 99%