{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:20Z","timestamp":1750306160594,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2980258.2980338","type":"proceedings-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T12:22:17Z","timestamp":1478089337000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Resource Allocation Between Temporal Cloud Database and User Using Access Control"],"prefix":"10.1145","author":[{"given":"S.","family":"Muthurajkumar","sequence":"first","affiliation":[{"name":"Department of Information Science and Technology, College of Engineering Guindy, Anna University, Chennai, India"}]},{"given":"M.","family":"Vijayalakshmi","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, College of Engineering Guindy, Anna University, Chennai, India"}]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, College of Engineering Guindy, Anna University, Chennai, India"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.142"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/cloudcom.2015.79"},{"key":"e_1_3_2_1_3_1","first-page":"2","article-title":"A Hyper-Heuristic Scheduling Algorithm for Cloud","volume":"2","author":"Chun-Wei Tsai","year":"2014","unstructured":"Chun-Wei , Tsai . , Wei-Cheng , Huang ., Meng-Hsiu , Chiang ., Ming-Chao , Chiang ., Chu-Sing , Yang . 2014 . A Hyper-Heuristic Scheduling Algorithm for Cloud . IEEE Transactions on Cloud Computing. 2 , 2 (Apr-Jun 2014), 23--37. http:\/\/doi: 10.1109\/tcc.2014.2315797. 10.1109\/tcc.2014.2315797 Chun-Wei, Tsai., Wei-Cheng, Huang., Meng-Hsiu, Chiang., Ming-Chao, Chiang., Chu-Sing, Yang. 2014. A Hyper-Heuristic Scheduling Algorithm for Cloud. IEEE Transactions on Cloud Computing. 2, 2 (Apr-Jun 2014), 23--37. http:\/\/doi: 10.1109\/tcc.2014.2315797.","journal-title":"IEEE Transactions on Cloud Computing."},{"key":"#cr-split#-e_1_3_2_1_4_1.1","doi-asserted-by":"crossref","unstructured":"Ganapathy S. Kulothungan K. Muthurajkumar S. Vijayalakshmi M. Yogesh P. and Kannan A. 2013. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey EURASIP- Journal of Wireless Communications and Networking - SpringerOpen Journal. 271: (2013) 1--16. http:\/\/doi: 10.1186\/1687-1499-2013-271. 10.1186\/1687-1499-2013-271","DOI":"10.1186\/1687-1499-2013-271"},{"key":"#cr-split#-e_1_3_2_1_4_1.2","doi-asserted-by":"crossref","unstructured":"Ganapathy S. Kulothungan K. Muthurajkumar S. Vijayalakshmi M. Yogesh P. and Kannan A. 2013. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey EURASIP- Journal of Wireless Communications and Networking - SpringerOpen Journal. 271: (2013) 1--16. http:\/\/doi: 10.1186\/1687-1499-2013-271.","DOI":"10.1186\/1687-1499-2013-271"},{"key":"e_1_3_2_1_5_1","first-page":"2","article-title":"Combining Efficiency, Fidelity, and Flexibility in Resource Information Services","volume":"64","author":"Haiying Shen","year":"2015","unstructured":"Haiying , Shen . , Yuhua , Lin . and Ting , Li . 2015 . Combining Efficiency, Fidelity, and Flexibility in Resource Information Services . IEEE Transactions on Computers. 64 , 2 (Feb. 2015), 353--366. http:\/\/doi: 10.1109\/tc.2013.222. 10.1109\/tc.2013.222 Haiying, Shen., Yuhua, Lin. and Ting, Li. 2015. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services. IEEE Transactions on Computers. 64, 2 (Feb. 2015), 353--366. http:\/\/doi: 10.1109\/tc.2013.222.","journal-title":"IEEE Transactions on Computers."},{"key":"e_1_3_2_1_6_1","volume-title":"Competitive Strategies for Online Cloud Resource Allocation with Discounts. IEEE 35th International Conference on Distributed Computing Systems.","author":"Hu Xinhui","year":"2015","unstructured":"Hu , Xinhui . , Arne , Ludwig ., Andrea , Richa . and Stefan , Schmid . 2015 . Competitive Strategies for Online Cloud Resource Allocation with Discounts. IEEE 35th International Conference on Distributed Computing Systems. (2015), 93--102. http:\/\/doi: 10.1109\/icdcs.2015.18. 10.1109\/icdcs.2015.18 Hu, Xinhui., Arne, Ludwig., Andrea, Richa. and Stefan, Schmid. 2015. Competitive Strategies for Online Cloud Resource Allocation with Discounts. IEEE 35th International Conference on Distributed Computing Systems. (2015), 93--102. http:\/\/doi: 10.1109\/icdcs.2015.18."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2402655"},{"key":"e_1_3_2_1_8_1","first-page":"2","article-title":"OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices","volume":"3","author":"Jin Li.","year":"2015","unstructured":"Jin , Li. , Xiao , Tan ., Xiaofeng , Chen ., Duncan , S., Wong , and Fatos , Xhafa . 2015 . OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices \", IEEE Transactions on Cloud Computing , 3 , 2 (Jun 2015), 195--205. http:\/\/doi: 10.1109\/tcc.2014.2366148. 10.1109\/tcc.2014.2366148 Jin, Li., Xiao, Tan., Xiaofeng, Chen., Duncan, S., Wong, and Fatos, Xhafa. 2015. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices\", IEEE Transactions on Cloud Computing, 3, 2 (Jun 2015), 195--205. http:\/\/doi: 10.1109\/tcc.2014.2366148.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_1_9_1","first-page":"2","article-title":"Aggressive Resource Provisioning for Ensuring QoS in Virtualized Environments","volume":"64","author":"Jinzhao Liu","year":"2015","unstructured":"Jinzhao , Liu . , Yaoxue , Zhang ., Yuezhi , Zhou ., Di , Zhang , and Hao , Liu . 2015 . Aggressive Resource Provisioning for Ensuring QoS in Virtualized Environments \", IEEE Transactions on Computers , 64 , 2 (Feb 2015), 119--131. http:\/\/doi: 10.1109\/tcc.2014.2353045. 10.1109\/tcc.2014.2353045 Jinzhao, Liu., Yaoxue, Zhang., Yuezhi, Zhou., Di, Zhang, and Hao, Liu. 2015. Aggressive Resource Provisioning for Ensuring QoS in Virtualized Environments\", IEEE Transactions on Computers, 64, 2 (Feb 2015), 119--131. http:\/\/doi: 10.1109\/tcc.2014.2353045.","journal-title":"IEEE Transactions on Computers"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Cloud Federations in the Sky: Formation Game and Mechanism","volume":"3","author":"Lena Mashayekhy","year":"2015","unstructured":"Lena , Mashayekhy . , Mahyarmovahed , Nejad . and Daniel , Grosu . 2015 . Cloud Federations in the Sky: Formation Game and Mechanism . IEEE Transactions on Cloud Computing , 3 , 1 (Mar 2015), 14--27. http:\/\/doi: 10.1109\/tcc.2014.2338323 10.1109\/tcc.2014.2338323 Lena, Mashayekhy., Mahyarmovahed, Nejad. and Daniel, Grosu. 2015. Cloud Federations in the Sky: Formation Game and Mechanism. IEEE Transactions on Cloud Computing, 3, 1 (Mar 2015), 14--27. http:\/\/doi: 10.1109\/tcc.2014.2338323","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ic2e.2015.48"},{"key":"e_1_3_2_1_12_1","first-page":"123","article-title":"Intelligent Trust Based Temporal Data Storage and Retrieval Methods for Cloud Databases","volume":"9","author":"Muthurajkumar S.","year":"2015","unstructured":"Muthurajkumar , S. , Vijayalakshmi , M. and Kannan , A. 2015 . Intelligent Trust Based Temporal Data Storage and Retrieval Methods for Cloud Databases . AENSI Journals in Advanced in Natural and Applied Sciences. 9 , 6 (2015), 123 -- 128 . Muthurajkumar, S., Vijayalakshmi, M. and Kannan, A. 2015. Intelligent Trust Based Temporal Data Storage and Retrieval Methods for Cloud Databases. AENSI Journals in Advanced in Natural and Applied Sciences. 9, 6 (2015), 123--128.","journal-title":"AENSI Journals in Advanced in Natural and Applied Sciences."},{"key":"#cr-split#-e_1_3_2_1_13_1.1","doi-asserted-by":"crossref","unstructured":"Muthurajkumar S. Vijayalakshmi M. and Kannan A. 2015. Secured Temporal Log Management Techniques for Cloud. Procedia Computer Science 46 (2015) 589--595. http:\/\/doi: 10.1016\/j.procs.2015.02.098. 10.1016\/j.procs.2015.02.098","DOI":"10.1016\/j.procs.2015.02.098"},{"key":"#cr-split#-e_1_3_2_1_13_1.2","doi-asserted-by":"crossref","unstructured":"Muthurajkumar S. Vijayalakshmi M. and Kannan A. 2015. Secured Temporal Log Management Techniques for Cloud. Procedia Computer Science 46 (2015) 589--595. http:\/\/doi: 10.1016\/j.procs.2015.02.098.","DOI":"10.1016\/j.procs.2015.02.098"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087186"},{"key":"e_1_3_2_1_15_1","first-page":"2","article-title":"Dynamic Collaboration Between Networked Robots and Clouds in Resource-Constrained Environments","volume":"12","author":"Parul Pandey","year":"2015","unstructured":"Parul , Pandey . , Dario , Pompili . and Jingang , Yi . 2015 . Dynamic Collaboration Between Networked Robots and Clouds in Resource-Constrained Environments . IEEE Transactions on Automation Science And Engineering , 12 , 2 (Apr 2015), 472--479. http:\/\/doi: 10.1109\/tase.2015.2406115. 10.1109\/tase.2015.2406115 Parul, Pandey., Dario, Pompili. and Jingang, Yi. 2015. Dynamic Collaboration Between Networked Robots and Clouds in Resource-Constrained Environments. IEEE Transactions on Automation Science And Engineering, 12, 2 (Apr 2015), 472--479. http:\/\/doi: 10.1109\/tase.2015.2406115.","journal-title":"IEEE Transactions on Automation Science And Engineering"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1187441.1187442"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805980"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"}],"event":{"name":"ICIA-16: International Conference on Informatics and Analytics","acronym":"ICIA-16","location":"Pondicherry India"},"container-title":["Proceedings of the International Conference on Informatics and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2980258.2980338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:51Z","timestamp":1750217991000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":20,"alternative-id":["10.1145\/2980258.2980338","10.1145\/2980258"],"URL":"https:\/\/doi.org\/10.1145\/2980258.2980338","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}