You are previewing International Journal of Cloud Applications and Computing (IJCAC) Volume 6, Issue 2.
O'Reilly logo
International Journal of Cloud Applications and Computing (IJCAC) Volume 6, Issue 2

Book Description

The International Journal of Cloud Applications and Computing (IJCAC) is a peer reviewed publication that focuses on practical applications and the theoretical foundations of cloud computing. This is achieved through the presentation of the most up-to-date advances and new directions of research in the field from various scholarly, professional, and practitioner perspectives. Through an interdisciplinary look at cloud computing, including engineering and business aspects, IJCAC covers and encourages high-quality research exposition on topics such as virtualization technology, utility computing, SaaS, and grid computing, as well as Web services, SOA, Web 2.0, and services computing.

This issue contains the following articles:

  • Detection and Ignoring of Blackhole Attack in Vanets Networks
  • A Based-Rule Method to Transform CIM to PIM into MDA
  • An Improved Secure SIP Registration Mechanism to Avoid VoIP Threats
  • A Practical Application of TrimCloud: Using TrimCloud as an Educational Technology in Developing Countries
  • Applying the Updated Delone and Mclean is Success Model for Enterprise Cloud Computing Readiness
  • A Generic, Multi-Period and Multi-Partner Cost Optimizing Model for Cloud-Based Supply Chain
  • A Satiated Method for Cloud Traffic Classification in Software Defined Network Environment

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Special Issue on Open Source Software Computing
  5. Detection and Ignoring of Blackhole Attack in Vanets Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. THE AODV ROUTING PROTOCOL
    4. 3. THE BLACKHOLE ATTACK
    5. 4. RELATED WORK
    6. 5. SOLUTIONS AND RECOMMENDATIONS
    7. 6. CONCLUSION
    8. REFERENCES
  6. A Based-Rule Method to Transform CIM to PIM into MDA
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. PROPOSED METHOD FOR TRANSFORMING CIM TO PIM
    5. 4. CASE STUDY
    6. 5. ANALYSIS AND DISCUSSION
    7. 6. CONCLUSION
    8. REFERENCES
  7. An Improved Secure SIP Registration Mechanism to Avoid VoIP Threats
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. SIP PROTOCOL OVERVIEW
    4. 3. SIP THREATS
    5. 4. PROPOSED MODEL
    6. 5. CONCLUSION
    7. REFERENCES
  8. A Practical Application of TrimCloud:
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. DESIGN OF TRIMCLOUD
    4. 3. PREPARING TRIMCLOUD TO BE USED AS AN EDUCATIONAL TECHNOLOGY
    5. 4. SOLVING PRESENTED PROBLEMS IN DEVELOPING COUNTRIES
    6. 5. RELATED WORK
    7. 6. FUTURE NETWORK ENHANCEMENTS TO TRIMCLOUD FOR USE AS AN EDUCATIONAL TECHNOLOGY
    8. ACKNOWLEDGMENT
    9. REFERENCES
  9. Applying the Updated Delone and Mclean is Success Model for Enterprise Cloud Computing Readiness
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CLOUD COMPUTING DEFINITIONS
    4. 3. CLOUD COMPUTING SERVICES
    5. 4. CLOUD COMPUTING CATEGORIES
    6. 5. THE PARTICIPANTS OF THE CLOUD'S WORLD
    7. 6. ADVANTAGES OF CLOUD COMPUTING
    8. 7. LIMITATIONS WITH CLOUDS
    9. 8. SECURITY PROBLEMS IN CLOUD COMPUTING
    10. 9. APPLYING THE UPDATED DELONE AND MCLEAN IS SUCCESS MODEL
    11. 10. CONCLUSION
    12. ACKNOWLEDGMENT
    13. REFERENCES
  10. A Generic, Multi-Period and Multi-Partner Cost Optimizing Model for Cloud-Based Supply Chain
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CLOUD COMPUTING FROM COSTING PERSPECTIVE
    4. 3. A GENERIC COST OPTIMIZATION MODEL
    5. 4. DISCUSSION
    6. 5. CONCLUSION
    7. REFERENCES
  11. A Satiated Method for Cloud Traffic Classification in Software Defined Network Environment
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUND
    4. 3. COLLABORATING SDN AND CLOUD TECHNOLOGIES
    5. 4. A SUGGESTED MODEL FOR SOFTWARE DEFINED CLOUD TRAFFIC CLASSIFICATION USING SDN
    6. 5. CONCLUSION
    7. REFERENCES
  12. Call For Articles