Saturday, May 23, 2020

The Socialization And Dilution Of Marxist Theory Essay

The Socialization and Dilution of Marxist Theory in the Post-WWII Era In Antonio Gramsci’s â€Å"Hegemonic Theory† in The Prison Notebooks, the Neo-Marxist ideology of cultural and social monopolies is the underlying source of bourgeoisie corruption and economic dysfunction. Gramsci‘s view of capitalist fascist ideology had failed to understand the complexity of capitalism as a system that dominated academia, the mass media, and other forms of institutionalization that co-opted Marxist leftists movements in the economic booms of the 1970s and 1980s: An analysis, for instance, of how the conservative regimes of Margaret Thatcher in England and Ronald Reagan in the United States in the late 1970s and early 1980s won power would dissect how conservative groups gained dominance through control of the state, and the use of media, new technologies, and cultural institutions such as think tanks and fund-raising and political action groups (Kellner, 2005, p.6). In this theory, Gramsci defined the social and cultural aspects of education, mass media, and other cultural forms of â€Å"think-tank† operations led by elites in the capitalist classes, which negates the underlying power of capital that simply purchased these ideologies and moderated them for the benefit of the bourgeoisie. Gramsci’s Neo-Marxist ideology shows the variability of social and cultural forces, which denies the economic materialism of Marx’s underlying lying theory of ownership, production, and propaganda generated byShow MoreRelatedThe Bankruptcy Of Marxist Ideology : The Dilution And Variability Essay1720 Words   |  7 PagesTopic 4: The Bankruptcy of Marxist Ideology: The Dilution and Variability of Marxist and Neo-Marxist Theory in the Post-WWI Era Introduction: This economic study will define the dilution and variability of Marxist and Neo-Marxist Theory in the post-WWII era. The slow dissolution of Marxist theory as as a 19th century economic concept defines the rise of capitalism and the neoliberal ideology that has permeated the latter half of the 20th century. The fall of communism in the late 1980s revealsRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesmacrostructural conditions shape migratory flows and shift destinations, see Moya, Cousins and Strangers, 80–88. 56. For critiques of national perspectives, see Hasia Diner, â€Å"History and the Study of Immigration: Narratives of the Particular,† in Migration Theory: Talking across Disciplines, ed. Caroline Brettell and James Hollifield (New York: Routledge, 2000), 27–42; Donna Gabaccia, â€Å"Is Everywhere Nowhere? Nomads, Nations, and the Immigrant Paradigm of United States History,† Journal of American History

Tuesday, May 12, 2020

Argument Of An Open Source Visualisation Tool - 8116 Words

Argument Visualisation tools 1. Abstract 2. Introduction Argumentation is the area that studies the relation between a claim and any statement that supports or opposes this claim. Argument visualisation is the way to present the arguments, which make it easy way to analysis and evaluate. There are many tools help to visualise arguments used different type of visualisation, such as, network, tree, and table. Argument graph is import to summarize the complex argument on documents, which make all the argument’s elements and relation clear and explicit. Also it can play role in making decision. The decision can be taken after analysis the graph and find solution for problems. 3. Background 3.1. Network Visualisation: It is type of visualisation which support directed and undirected graph. The graph consists of nodes and lines. 3.1.1. CompendiumLD: is an open source visualisation tool that is usually used for learning purposes [1]. It helps education’s staff to organise their ideas, design learning tutorials, and share relevant materials with students. CompendiumLD has a clear layout as Fig. 1 shows. This tool consists of sets of icons. Users can simply drag and drop the icons and use arrows to link between the icons and describe task’s direction between them. The icons are divide to groups according to their objectives [2]. Some icons are used for learning design while other are used to express conditional issues in the task. For example, if a student passes theShow MoreRelatedThe Decision Of Childhood Vaccination2130 Words   |  9 Pagesslightly hyperbolic comparison between the two groups forcing puts the readers in an uncomfortable position where they are perhaps ‘forced’ to reevaluate what unintended consequences the â€Å"no jab, no pay† policy may induce. Adding c larity to this line of argument, Aly is then logically reminding the audience that the main objective of the policy is to â€Å"get more people immunised†; and so to further dismiss the merit and perceived gains that come with â€Å"exiling]† anti-vaxxers, and establish the idea that â€Å"noRead Moremotivational techniques used by infosys6547 Words   |  27 Pagesquestions with multiple-choice answers, rather than general open-ended questions. Specific questions improve clarity and consistency of understanding among respondents, and a multiple-choice format enables the answers to be converted into scores which can be loaded into a spreadsheet and very easily analysed. General or vague questions on the other hand tend to lead to varying interpretation (or confusion) among respondents; also, by inviting an open-ended answer you will generate lots of narrative-basedRead MoreStrategic Management Accounting and Balanced Score Card11170 Words   |  45 Pageswill be ab le to: ï  ± Appreciate the organisational necessity, and difficulty, in being strategic – i.e., (re-)planning and continually monitoring for alignment between organisational aims and actions. ï  ± Describe some of the key components (tools and techniques) comprising SMA, and understand why they are regarded as such. ï  ± Describe the balanced scorecard, including its four main perspectives and main assumptions; and understand its aims for holistic and integrated performance measurementRead MoreDissertation-Viral Marketing27075 Words   |  109 Pages................................................................................... 23 3.3 Interview subjects ...................................................................................................................... 24 3.4 Secondary sources ..................................................................................................................... 25 3.5 Data analysis............................................................................................................Read MoreA Study on Enhanced Employee Performance Through Soft Skills20707 Words   |  83 Pagessoft skills 62 3. Research Methodology 65-69 3.1 Meaning of Research Methodology 65 3.2 Objectives of Research Methodology 66 3.3 Types of Research 66 3.4 Sample Design 66 3.5 Tools of data collection 67 3.6 Sources of data 67 3.7 Universe of the study 68 3.8 Pre Test 68 3.9 Statistical Tool 68 4. Data Analysis and Interpretations 70-94 4.1 Soft Skills Component 70 4.2 Essentiality of Soft Skills 71 4.3 Best Place To Impart Soft Skills Training 72 4.4 Sufficient ImportanceRead MoreChange Management13001 Words   |  53 Pages7-S Model is a framework for analyzing organizations and their effectiveness. It looks at the seven key elements that make the organizations successful, or not: strategy; structure; systems; style; skills; staff; and shared values. The 7-S model is a tool for managerial analysis and action that provides a structure with which to consider a company as a whole, so that the organization s problems may be diagnosed and a strategy may be developed and implemented. The 7-S diagram illustrates the multiplicityRead MoreMarriage Guidance: Summary Notes19959 Words   |  80 Pagesdemonstrate sympathy to the person whenever he/ she is upset → A partner should always be willing to express innermost thoughts and feelings at all times → A partner should be loyal by automatically siding with the person when they’ve been in an argument with others. → A partner should always want do to things with the person, devoting time and attention to the relationship → A partner should choose the person above all others at all times. → A partner should allow the person to continue to takeRead MoreEmotional Intelligence15079 Words   |  61 Pagesis having is to have a leader who is compelling and inspired to do their work (Burns, 1978). Until the twentieth century that is when leadership was studied scientifically. What determines leadership was the main focus of the study (Yukul, 1998). Sources of power of the leaders, behaviour that is exhibited by the leaders, traits that make up good leaders and also the abilities they have as leaders were the areas that were focused on in social sciences. A new base of the influence of leadership wasRead MoreMarketing Management130471 Words   |  522 Pagesrelations Understanding individual consumer behaviour Understanding industrial consumer behaviour Customer satisfaction Customer relationship management Marketing of services Rural marketing Types of marketing research Process of marketing research Tools and Techniques of marketing research Applications of marke ting research Preparation of marketing research report Online marketing E-commerce Trends in marketing Page No. Marketing management – an introduction Unit structure: 1. Introduction

Wednesday, May 6, 2020

Girl in the Window Analysis Paper Free Essays

Brittaney Doss ENG 303 November 15, 2012 Girl in the window Response Questions 1. What is your initial reaction to this piece? Use descriptive language to describe how you felt while reading this. * I endured several emotions while reading this piece. We will write a custom essay sample on Girl in the Window Analysis Paper or any similar topic only for you Order Now It was an emotional roller coaster for me. Emotions of sadness, hopefulness, and happiness came over me while reading this piece. I was floored when reading the conditions of the home in the beginning of the piece; I couldn’t believe that people could live in such conditions, yet alone with a baby. I also was taken for a loop when I read the consequences that the mother received. I was extremely upset with the protocol of Child Protective Services. The testimonial from the mother made me angry. I too grew up in a toxic situation for most of my childhood. Although my conditions were not comparable to the environment that Danielle was in, I could feel that look that the writer described as pain and hopelessness. I could not have sympathy for this woman and I couldn’t accept how she could justify her actions. 2. What is investigative journalism? * The journalist investigates and researches a specific topic for a long period of time. They use the newly found information and older facts to create the story. Their job is to uncover facts that have not been revealed. 3. Lane DeGregory (woman) wrote this piece. What can you find out about her online? * When I searched Lane I found links to her social network accounts, videos and personal website. I also found several articles about â€Å"Girl in the Window. † There was additional information on the journey that he endured while investigating Danielle’s story. Her copartner Melissa, who was a photojournalist, revealed information about Lane. I found information on how to contact and book her for group talks and information about other pieces in which she has written. 4. Discuss Lane DeGregory’s style in your own words. What’s working in this piece to make it a Pulitzer Prize winner? * She was able to incorporate imagery using descriptive words and placed quotes within the piece that added emotion and sensory. The chronological arrangement of the piece was done differently she started from beginning to end and kept it in order but also added known facts and interview questions that flowed and the transitions where very easy to follow. I thought the sub headings with in the story also created a change of scene almost. She incorporated all sides of the story from the social worker to the law enforcement to the doctors to the teachers to the adopting family and to the mother. It was like reading a documentary. After reading this peace I had no questions about what was next I felt that Dani was in great care and I had no doubt that she would get better. She didn’t leave a hanger for the reader. I was complete at the end of the article. That to me made it Pulitzer Prize worthy. 5. How does â€Å"Girl in the Window† differ from other articles we’ve read? * The Girl in the Window reads like a story rather that an article. It has a rising action and a resolution. Normally articles don’t end with the happy ending; you have to research or follow up to find out more information. Lane included a start middle and ending to the piece. At the end of the article I felt like I was closing a book or there would be credits following the last word. 6. What qualities does it share with other articles we’ve read? * The very first article we read about James Cameron shares similar qualities. Both writers had to endure a long journey to collect information for these pieces. You can compare the on-site time spent by both authors. The two articles couldn’t have been written with dedicating the proper time. 7. What techniques were utilized and how did this article come together? * Lane used details and ravishing quotations throughout the piece. It was a timeline piece use great transitions and subheading to help the reader keep up. She used descriptive words and did a amazing job setting the scenes as she wrote about them. 8. How did Lane DeGregory build her characters in the story? Lane gives us background information about the Lierows and then at the end she lets us into the background of Dani’s birth mother. She lets the readers know about the characterictics of the Lierows by sharing their daily activities and there at home lifestyles. 9. What did Oprah do after she learned/read this article? * Oprah did a segment on Dani’s story and the exposure lea d to strangers donating over $10,000 to fund her long term care cost. Later her parent released a book this year called Dani’s Story: A Journey from Neglect to Love. How to cite Girl in the Window Analysis Paper, Essay examples

Sunday, May 3, 2020

Australian Regional Retailer Of Foodstuffs - Myassignmenthelp.Com

Question: Discuss About The Australian Regional Retailer Of Foodstuffs? Answer: Introducation Webbs Stores is an Australian regional retailer of foodstuffs. The main data centers of this retailer are in Melbourne and Sydney. The other regional data centers are in Brisbane, Wagga, Auckland, Port Macquarie and Bathurst. They have decided to take cloud computing in their business. The main problem that Webbs Stores are facing is the operational complexity, application complexity and management of data (Almorsy, Grundy Mller, 2016). They have thought of closing their data center in Auckland rather than replacing or updating the existing infrastructure. The services and the data are moved to the cloud. They are also planning to run a Risk and Security Workshop to assess the security threats, risks and the probable methods of control required for hybrid cloud. The report outlines the brief description of the case study of Webbs Stores. It covers the advantages of migration of data from MS SQL Server 2012 R2 database to IaaS instance in cloud. It also covers the risks that are associated for the migration of data and services with proper details (Garg, Versteeg Buyya, 2013). The report further describes the utilization of cloud in backup and for the removal of records. The final part of the report gives a description about the procedure of protecting access to the services for moving to the cloud. Proper recommendations are also provided in the report. Discussion Webbs Stores are migrating their data and services from MS SQL Server 2012 R2 databases to an IaaS instance in the cloud. The type of cloud security policy that can be deployed for protecting the critical database after moving to an IaaS instance in a public cloud is the authorization and authentication (Hashizume et al., 2013). Cloud computing is the way of utilizing the network of several remote servers that is hosted to control, store and process data on the Internet. Authentication is the procedure to enable confidence in the identities of the users. The Security Assertion Markup Language or SAML is an open standard data format that are utilized for authentication in cloud computing. Authorization is the permission given to a sanctioned individual or organizational body to access any confidential data or service. Webbs Stores is dealing with high security data and services. It is evident that the authority will not give permission to access their data and services. The security p olicy of authentication and authorization will provide them excess security and there will be extremely low chances of the data being hacked (Malawski et al., 2013). Moreover, cloud computing modules are extremely safe and secured and thus it can be claimed that if Webbs Stores will migrate their MS SQL Server 2012 R2 database to an IaaS instance, they should undertake authentication and authorization security policy. Benefits and Issues of Deployment Webbs Stores is taking authentication and authorization policy for the security of their data in the cloud. They will get several benefits if they will deploy this particular policy in their organization. The main advantages of this policy are as follows: i) Scalability: This security policy provides excellent scalability to the database (Li et al., 2013). This will be extremely helpful to the company. ii) Flexibility: Another main advantage of this security policy is that the entire system becomes flexible. iii) Cost Effective: The third advantage of this security policy is that the maintenance cost becomes lower and thus can be claimed as cost effective. iv) High Security: This is the most important benefit if this policy. The security level is extremely high, which makes it popular for all organization (Arora, Parashar Transforming, 2013). The authentication and authorization policy allows only authorized users to access the data in authenticated servers. However, in spite of the above-mentioned benefits, authentication and authorization policy undergoes several issues (Tao et al., 2014). The issues that Webbs Stores can have after deploying this security policy are as follows:i) Complexity: The main issue that is faced after deploying this type of security is the complexity. The authentication and authorization sometimes become extremely complex after it is deployed.i) Brute Force Attacks: This is another dangerous issue that is faced when this type of security is deployed (Wei et al., 2014). Brute force attacks are extremely dangerous for any organizational databases. It opens the way for intruders and hackers and the data can be leaked. iii) Storage: When password authentication is used, the usernames and passwords should be stored in a database for authentication purposes. Storing of these passwords are done in a particular database. The storage can be easily hacked and the passwords and the usernames can be easily stolen. iv) Encryption: Encryption is mandatory for this type of security (Garg, Versteeg Buyya, 2013). However, there is a high chance that symmetric or the asymmetric key would be lost and the user can be in problem. Risks for Migration Risks and threats are evident and common in case of data migration. Webbs Stores is migrating their database to an IaaS instance in public cloud. Several risks can occur in case of database. The risks that applies to the database are as follows: i) Data Loss: This is the principal risk that comes into account when data migration is done. There is a high chance that the data would be loss when the data is being migrated (Hashem et al., 2015). The database might lose the data completely. ii) Corruption of Database: There is always a chance that the database would be corrupted. This type of risk is very common in migration of data. The database even cannot be recovered any more. Webbs Stores should be careful before they migrate their data. The IaaS Infrastructure The risks applied to the Infrastructure as a Service database are as follows: i) Insider Threats: The main risk that is applied to the IaaS instance while migration of data is the insider threats (Hashizume et al., 2013). An IaaS database in a public cloud allows and enables internal administrator to access the entire database and data. Webbs Stores should be careful enough before migrating their data. ii) Denial of Service: This is another important risk that can take place in case of migrating the data in IaaS infrastructure. When a client utilizes the cloud resources, the service quality of the other clients are degraded. The hackers use this opportunity and utilize all the shared resources to slow down the system and even deny the cloud services (Malawski et al., 2013). This type of attack is known as denial of service or DoS attack that prevents the clients from accessing the resources. The Communications There are several risks in communications between the Webbs Stores and the IaaS database. They are as follows: i) Data Breach: This is the main risk that can occur while communication between IaaS and Webbs Stores (Fernando, Loke Rahayu, 2013). Data can be easily breached while migration. ii) Incompatible Database: This is the second type of risk that can occur while communications between IaaS and Webbs Stores. Database should be compatible so that there exists no issues. Cloud for Backup and Removal of Records Webbs Stores should back up their data periodically. However, there are few risks that can take place while this backup. They are as follows: Security: This is the most common risk while backing up of data is done. Data gets lost and can never be recovered once lost. Control over Data: When data is backed up, the client of the cloud gets complete control over that data (Hashem et al., 2015). This sometimes turns out to be risky as the cloud provider gets complete access and control over that data. He might not be trusted person and data can be theft. Webbs Stores may face several risks while storing their data in the cloud storage. The risks related to this are as follows: Security: This is again the most common risk in case of cloud storage. There is a high chance that the data would be lost and cannot be recovered (Wei et al., 2014). Moreover, there is a chance that the data can be theft or hacked. Lack of standardization: Vendors do not follow a standard set of rules and protocols for business support. Therefore, Webbs Stores should select their vendor carefully to avoid any type of storage risks. Webbs Stores might undergo several risks while retrieving their data from the cloud (Dinh et al., 2013). The risks applied to retrieval of data are as follows: Data Leakage: There is a high chance that the data can be leaked while retrieval. This type of leakage is extremely common in case of public cloud. Snooping: This is another most common risk in case of data snooping in cloud. The hacker or the intruder can snoop in or look into the data while retrieval of data is done. Cloud disaster recovery or DR is the strategy for backup and recovery of data, which is used for maintaining and storing of the electronic records for a security measure (Li et al., 2013). Cloud backup plays a very significant role in cloud disaster recovery plan. When Webbs Stores is migrating their data to the cloud database, the DR plan helps them to simplify the process. They do not have to migrate everything rather if they will only migrate their storage. The main advantage that Webbs Stores will get is that after deploying cloud back up is that a copy of their data will be sent in a public network to an offsite server (Rahimi et al., 2014). A provider of third party, who charges, normally hosts this server to the customers. The main advantage of backup and restore strategy is that the data can be easily backed up. It will be helpful to Webbs Stores as there will be a scope for backing up of data. This will change the entire system of database of this organization. Another advantage of data backup and restore strategy is that the data can be easily recovered by this strategy (Sanaei et al., 2014). If there is a chance that the data can be lost during migration, this strategy will help Webbs Stores to recover their data quickly and easily. Protecting Access and Recommendations Webbs Stores should be careful before providing access to the data and services. Only the authorized and sanctioned individuals would get the permission to access the services and data. There should be an authority only to look into the matter of authorization of access to the services. IaaS Infrastructure The infrastructure of IaaS is an extremely delicate infrastructure that should be utilized by only authorized users. Two methods are recommended to Webbs Stores for protecting access to IaaS infrastructure. They are as follows: i) Physical Access to Infrastructure: The physical access to the IaaS infrastructure should be secured and protected so that unauthorized users are not able to access it (Dinh et al., 2013). Cloud vendor controls these. Precisely, it is recommended that the access to the physical server must be monitored and managed regularly. ii) Access via API: Cloud infrastructure works best and with great speed with management. It is automatic via API (Xiao, Song Chen, 2013). It is recommended for Webbs Stores that they should take care of the fact that unauthorized utilization of API should not exist at all. MS SQL Server 2012 R2 Cloud Instance The access to the MS SQL Server 2012 R2 can be easily protected by adopting certain security measures. The recommended security measures of access for MS SQL Server 2012 R2 are as follows: i) Physical Access: There should be a strict limit for accessing the physical server and the hardware components. The server should utilized by authorized users so that the access can be controlled. ii) Operating system Access: Webbs Stores should be careful about their access to the operating system of cloud network infrastructure. The main protection that Webbs Stores can take is the firewalls (Fernando, Loke Rahayu, 2013). They provide excess security and thus protect and control the access to the operating system. Moreover, it separates and restricts the network traffic. Cloud Network Infrastructure Webbs Stores should be careful about the protection and control of access to the infrastructure of cloud network. The recommendations that would be helpful for the cloud network infrastructure are as follows: i) Protection against External and Internal Threats: Security infrastructure should be secured so that no external and internal threats can attack (Rittinghouse Ransome, 2016). The information security team can assess the performance of the system on regular basis for relevant improvements. Webbs Stores should protect and control the access of their cloud network infrastructure so that the threats do not take place. ii) Server Monitoring: The server should be monitored and controlled time to time so that the access can be protected easily (Whaiduzzaman et al., 2014). The cloud network infrastructure is the most important hardware and software components that complete the entire cloud infrastructure. Cloud Backup and Restore Infrastructure Webbs Stores should be careful about the control and protection of access to the cloud backup and restoration infrastructure (Rahimi et al., 2014). There are certain recommendations for this organization for backing up and restoring their data in the infrastructure. This particular infrastructure can be protected by few recommendations. They are as follows: i) Encryption: This is the best solution for any confidential data. The data should be encrypted so that all the users are unable to retrieve those data (Avram, 2014). This encrypted data form will be helpful for protecting access to the cloud backup and restore infrastructure. ii) Passwords: The cloud backup and restore infrastructure should be password protected so that it is not accessible to everyone (Botta et al., 2016). Moreover, this password should be biometric protected so that only authorized individuals will be able to access it. These recommendations would be helpful and useful to the Board of Webbs Stores for their successful migration of data to the IaaS cloud and their backup and restore strategies. Conclusion Therefore, from the above discussion it can be concluded that Webbs Stores is an Australian regional retailer of foodstuffs. The main data centers of this retailer are in Melbourne and Sydney. The other regional data centers are in Brisbane, Wagga, Auckland, Port Macquarie and Bathurst. They have decided to take cloud computing in their business. The main problem that Webbs Stores are facing is the operational complexity, application complexity and management of data. They have thought of closing their data center in Auckland rather than replacing or updating the existing infrastructure. The services and the data are moved to the cloud. They are also planning to run a Risk and Security Workshop to assess the security threats, risks and the probable methods of control required for hybrid cloud. The above report gives a detailed discussion about the benefits and problems in migration of data to the IaaS instance in cloud. The report also provides the detailed research about the risks a nd challenges about the database, the infrastructure of IaaS and the communications between Webbs and the IaaS database in the cloud. Webbs Stores is also considering to utilize cloud for their backup and archival of records. The report also helps to understand the probable risks and issues associated with the backup, storage and retrieval of data from the cloud. This cloud backup will also affect in their disaster and recovery plans. This strategy would be helpful for Webbs Stores. Moreover, relevant recommendations are provided for protecting the access to the MS SQL Server 2012 R2, infrastructures of IaaS, cloud network and cloud back and restore. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Malawski, M., Juve, G., Deelman, E., Nabrzyski, J. (2015). Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds.Future Generation Computer Systems,48, 1-18. Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions.Mobile Networks and Applications,19(2), 133-143. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys Tutorials,16(1), 369-392. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344. Xiao, Z., Song, W., Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment.IEEE transactions on parallel and distributed systems,24(6), 1107-1117.