Cloud Computing

Automated Clustering of Virtual Machines based on Correlation of Resource Usage/Open Call Articles
Detection of Malware Attacks on Virtual Machines for a Self-Heal Approach in Cloud Computing using VM Snapshots/Open Call Articles
Layer-based Privacy and Security Architecture for Cloud Data Sharing/Open Call Articles
An Efficient Hierarchical Multi-Authority Attribute Based Encryption Scheme for Profile Matching using a Fast Ate Pairing in Cloud Environment/Open Call Articles
Security Enhancement in Cloud Environment using Secure Secret Key Sharing/Special Issue