Journal of Engineering and Applied Sciences
7000 - 7003
Adjei, J.K., 2014. Explaining the role of trust in cloud service acquisition. Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, Services and Engineering, April 8-11, 2014, IEEE, Oxford, England, ISBN:978-1-4799-4424-8, pp: 283-288.
Ahuja, S., S. Mani and J. Zambrano, 2012. A survey of the state of cloud computing in healthcare. Netw. Commun. Technol., 1: 12-19.
Ali, S.M., A.T. Yaseen and M.M. Jaber, 2014. E-learning approaches and models toward building integrated framework. Intl. J. Eng. Tech. Res., 2: 346-348.
Anzi, F.S.A., S.K. Yadav and J. Soni, 2014. Cloud computing: Security model comprising governance, risk management and compliance. Proceedings of the IEEE International Conference on Data Mining and Intelligent Computing (ICDMIC), September 5-6, 2014, IEEE, New Delhi, India, ISBN:978-1-4799-4673-0, pp: 1-6.
Bamiah, M., S. Brohi, S. Chuprat and M.N. Brohi, 2012. Cloud implementation security challenges. Proceedings of the IEEE International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), December 8-10, 2012, IEEE, Dubai, UAE., ISBN:978-1-4673-4415-9, pp: 174-178.
Bernardo, D.V., 2013. Utilizing security risk approach in managing cloud computing services. Proceedings of the 16th IEEE International Conference on Network-Based Information Systems (NBIS), September 4-6, 2013, IEEE, Gwangju, South Korea, ISBN:978-1-4799-2511-7, pp: 119-125.
Datta, E. and N. Goyal, 2014. Security attack mitigation framework for the cloud. Proceedings of the Annual IEEE Conference on Reliability and Maintainability, January 27-30, 2014, IEEE, Colorado Springs, Colorado, ISBN:978-1-4799-2849-1, pp: 1-6.
Dokurugu, J. and J. Amos, 2016. A review of cloud computing adoption in higher education institution. Inf. Technol. Res. J., 6: 1-6.
Doukas, C., T. Pliakas and I. Maglogiannis, 2010. Mobile healthcare information management utilizing cloud computing and android OS. Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology, August 31-September 4, 2010, Buenos Aires, pp: 1037-1040.
Gao, Z., Y. Li, H. Tang and Z. Zhu, 2013. Management process based cloud service security model. Proceedings of the IET International Conference on Cyberspace Technology (CCT), November 23-23, 2013, IET, Beijing, China, ISBN:978-1-84919-801-1, pp: 278-281.
Ghani, M.K.A. and M.M. Jaber, 2015. Willingness to adopt telemedicine in major Iraqi hospitals: A pilot study. Int. J. Telemedicine Appl., 2015: 1-7.CrossRef | Direct Link |
Hoang, D. and L. Chen, 2010. Mobile cloud for assistive healthcare. Proceedings of the IEEE Asia-Pacific Conference on Mobile Services Computing, December 6-10, 2010, IEEE, Hangzhou, China, ISBN:978-1-4244-9396-8, pp: 325-332.
Holzmann, V. and I. Spiegler, 2011. Developing risk breakdown structure for information technology organizations. Int. J. Project Manage., 29: 537-546.CrossRef |
Jassas, M.S., A.A. Qasem and Q.H. Mahmoud, 2015. A smart system connecting e-health sensors and the cloud. Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, May 3-6, 2015, Halifax NS., pp: 712-716.
Kiran, M., M. Jiang, D.J. Armstrong and K. Djemame, 2011. Towards a service lifecycle based methodology for risk assessment in cloud computing. Proceedings of the IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC), December 12-14, 2011, IEEE, Sydney, New South Wales, ISBN:978-1-4673-0006-3, pp: 449-456.
Kottari, V., V. Kamath, L.P. Saldanha and C. Mohan, 2013. A survey on mobile cloud computing: Concept, applications and challenges. Intl. J. Adv. Innovative Res., 2: 487-492.
Liu, X., Y. Yang, D. Cao, D. Yuan and J. Chen, 2012. Managing large numbers of business processes with cloud workflow systems. Proceedings of the 10th Australasian Symposium on Parallel and Distributed Computing Vol. 127, January 31-February 03, 2012, ACS Inc, Melbourne, Australia, ISBN:978-1-921770-08-1, pp: 33-42.
Mohammed, M.A., M.H. Kadhim, A. Fuad and M.M. Jaber, 2014. Follow up system for directorate of scholarship and cultural relations in Iraq. Proceedings of the IEEE International Conference on Computer, Communications and Control Technology, September 2-4, 2014, Langkawi, Malaysia, pp: 182-187.
Mounzer, J., T. Alpcan and N. Bambos, 2010. Integrated security risk management for IT-intensive organizations. Proceedings of the 6th IEEE International Conference on Information Assurance and Security, August 23-25, 2010, IEEE, Atlanta, Georgia, ISBN:978-1-4244-7407-3, pp: 329-334.
Rajaei, H. and J. Wappelhorst, 2011. Clouds and grids: A network and simulation perspective. Proceedings of the 14th Symposium on Communications and Networking, April 03-07, 2011, SCS International Publisher, Boston, Massachusetts, pp: 143-150.
Toosi, A.N., R. Calheiros and R. Buyya, 2014. Interconnected cloud computing environments: Challenges, taxonomy and survey. ACM. Comput. Surv., 47: 1-47.CrossRef | Direct Link |
Wang, Y., X. Lin and M. Pedram, 2013. A nested two stage game-based optimization framework in mobile cloud computing system. Proceedings of the IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), March 25-28, 2013, IEEE, Redwood City, California, ISBN:978-1-4673-5659-6, pp: 494-502.
Zhou, M., R. Zhang, W. Xie, W. Qian and A. Zhou, 2010. Security and privacy in cloud computing: A survey. Proceedings of the 6th International Conference on Semantics Knowledge and Grid, November 1-3, 2010, Beijing, pp: 105-112.