Organizations

A Multi-token Authorization Strategy for Secure Mobile Cloud Computing

Cloud computing is an emerging paradigm shifting the shape of computing models from being a technology to a utility. However, security, privacy and trust are amongst the issues that can subvert the benefits and hence wide deployment of cloud …

Requirements prioritization with respect to Geographically Distributed Stakeholders

Requirements selection for software releases can play a vital role in the success of software product. This selection of requirements is done by different requirements prioritization techniques. This paper discusses limitations of these Requirements …