30
Views
0
CrossRef citations to date
0
Altmetric
Articles

Improving quality of web applications deployed on cloud

, , &

References

  • Danilo Ardagna, Giuliano Casale, Michele Ciavotta, Jaun F. Perez, Weikun Wang: Quality-of-service in cloud computing: modelling techniques and their applications. Journal of Internet Services and Applications, Springer Open Journal. pp. 1-17. (2014).
  • Chen-Fang Tsai, Shin-Li Lu, Jen-Hsiang Chen: A New Quality Chart to Im- prove the Efficiency of Cloud Resource Management. In: 12th International Conference on e-Business Engineering, IEEE Explore, pp. 434-438. IEEE Ex- plore Digital Library (2015).
  • Rajiv Chopra: Testing Web Applications: The state of art and future trends. 1st Edn. Cambridge International Science Publishing, UK (2016).
  • Rashmi, G. Sahoo, Shaban Mehfuz: A Software Engineering Approach for Cloud Migration. In: Rajiv Ranjan, Raj Kumar Buyya, Anirban Basu. Advances in Cloud Computing, Proceedings of the International Conference on ACC, pp. 71-76. Universities Press (2012).
  • Vikrant Karvir, Umer Ansari, Larry Beser, Gary Harris, Yousuf Hasan, Manish Jain: Cloud Deployment Considerations for Service Providers. In: Rajiv Ranjan, Raj Kumar Buyya, Anirban Basu. Advances in Cloud Computing, Proceedings of the International Conference on ACC, pp. 134-140. Universi- ties Press (2012).
  • Hung Q. Nguyen: Testing Applications on the Web. 1st edn. Wiley Computer Publishing, USA (2001).
  • Peter Anderton: Cloud Migration: An Incremental Approach. PC Quest, pp. 25-27 (2011).
  • Shumpy Saini: Software Testing: New Methodologies. PC Quest, pp. 73-74, (2011).
  • C. Xavier: Web Technology and Design. Reprint Edition New Age International Publishers, (2015).
  • Arshad Noor: A Secure WebApplication Architecture for the Cloud. In: Rajiv Ranjan, Raj Kumar Buyya, Anirban Basu. Advances in Cloud Computing, Proceedings of the International Conference on ACC, pp. 150-151. Universities Press (2012).
  • Rajiv Chopra, Sushila Madan: Testing Websites using P3R2 Model. Inter- national Journal of Computer Science Issues, IJCSI. Vol. 9 issue 4. pp- 248-253. (2012).
  • Rajiv Chopra: Cloud Computing. Mercury learning and Information, USA (2019).
  • P. L. K. Priyadarsini: A Survey on some Applications of Graph Theory in Cryptography. Journal of Discrete Mathematical Sciences and Cryptography, Vol. 18 issue 3, pp. 209-217. (2015). doi: 10.1080/09720529.2013.878819
  • Kumar Abhishek: Set-Valued Graphs-A Survey. Journal of Discrete Mathemati- cal Sciences and Cryptography, Vol. 18 issue 1-2, pp. 55-80. (2015). doi: 10.1080/09720529.2014.894306
  • Ali Mesbah, Arie Van Deursen: Migrating Multi-Page Web Applications to Single Page Ajax Interfaces. In: 11th European Conference on Software Main- tenance and Reengineering, IEEE 2007, pp 181-190.
  • Rajiv Chopra, Kapila Kapoor: Regression Testing of a Relational Database. In IndiaCom-2009, pp 423-24 and 432.
  • Mc Cabe et. al: Using Cyclomatic Path Analysis to Detect Security Vulner- abilities. In: White Paper, 2011, pp 2-9.
  • Glenford J. Myers: The Art of Software Testing, Wiley India, 2009.
  • Rajiv Chopra: Web Security, Internet Security and Cyber Security: A Report. In: 2nd International Conference on Emerging Trends of Engineering, Science, Management and its Applications, pp 18-22, Volume 4, Special Issue, Proc. published by Pearson Inc., March 2015.
  • Rajiv Chopra, Sushila Madan: Locating a Pin in a Haystack before the Customer Finds. In: International Journal of Applied Information Systems (IJAIS), linked to Harvard University, pp 47-49, Volume 8, No. 2, Jan. 2015.
  • Rajiv Chopra: Security during Secure Software Development Life Cycle. In: International Conference on Engineering Technology, Management and Applied Sciences (ICETMAS-15), pp 1-4, Volume-1, Special Issue, and Proc. published by McGraw Hill (MGH), September 2015.
  • Symantec’s : Internet Security Threat Report, Vol. 17, pp 1-52, 2011.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.