-
1
-
-
34250009730
-
Cyberinsurance in it security management
-
W. S. Baer and A. Parkinson. Cyberinsurance in it security management. IEEE Security and Privacy, 5(3):50-56, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 50-56
-
-
Baer, W.S.1
Parkinson, A.2
-
3
-
-
0033204537
-
A flexible model for resource management in virtual private networks
-
New York, NY, USA, ACM
-
N. G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K. K. Ramakrishnan, and J. E. van der Merive. A flexible model for resource management in virtual private networks. In SIGCOMM '99: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, pages 95-108, New York, NY, USA, 1999. ACM.
-
(1999)
SIGCOMM '99: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
, pp. 95-108
-
-
Duffield, N.G.1
Goyal, P.2
Greenberg, A.3
Mishra, P.4
Ramakrishnan, K.K.5
van der Merive, J.E.6
-
4
-
-
50149105841
-
-
C. Ernemann and R. Yahyapour. Grid Resource Management - State of the Art and Future Trends, chapter Applying Economic Scheduling Methods to Grid Environments, pages 491-506. Kluwer Academic Publishers, 2003.
-
C. Ernemann and R. Yahyapour. "Grid Resource Management - State of the Art and Future Trends", chapter "Applying Economic Scheduling Methods to Grid Environments", pages 491-506. Kluwer Academic Publishers, 2003.
-
-
-
-
5
-
-
84870189971
-
Multilevel security and quality of protection
-
S. N. Foley, S. Bistaelli, B. O'Sullivan, J. Herber, and G. Swart. Multilevel security and quality of protection. In Proceedings of the First Workshop on Quality of Protection, 2005.
-
(2005)
Proceedings of the First Workshop on Quality of Protection
-
-
Foley, S.N.1
Bistaelli, S.2
O'Sullivan, B.3
Herber, J.4
Swart, G.5
-
7
-
-
34548484345
-
Development of scheduling strategies with genetic fuzzy systems
-
January
-
C. Franke, F. Hoffmann, J. Lepping, and U. Schwiegelshohn. Development of scheduling strategies with genetic fuzzy systems. Applied Soft Computing Journal, 8(1):706-721, January 2008.
-
(2008)
Applied Soft Computing Journal
, vol.8
, Issue.1
, pp. 706-721
-
-
Franke, C.1
Hoffmann, F.2
Lepping, J.3
Schwiegelshohn, U.4
-
8
-
-
38049044908
-
On business grid demands and approaches
-
Proceedings of the 4th International Workshop on Grid Economics and Business Models GECON 2007, of, Springer
-
C. Franke, A. Hohl, P. Robinson, and B. Scheuermann. On business grid demands and approaches. In Proceedings of the 4th International Workshop on Grid Economics and Business Models (GECON 2007), volume 4685 of Lecture Notes in Computer Science, pages 124-135. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4685
, pp. 124-135
-
-
Franke, C.1
Hohl, A.2
Robinson, P.3
Scheuermann, B.4
-
9
-
-
50249146957
-
Genetic Fuzzy Systems applied to Online Job Scheduling
-
London, June, IEEE, IEEE Press
-
C. Franke, J. Lepping, and U. Schwiegelshohn. Genetic Fuzzy Systems applied to Online Job Scheduling. In Proceedings of the 2007 IEEE International Conference on Fuzzy Systems, pages 1573-1578, London, June 2007. IEEE, IEEE Press.
-
(2007)
Proceedings of the 2007 IEEE International Conference on Fuzzy Systems
, pp. 1573-1578
-
-
Franke, C.1
Lepping, J.2
Schwiegelshohn, U.3
-
10
-
-
34548141778
-
Towards the autonomic business grid
-
Los Alamitos, CA, USA, IEEE Computer Society
-
C. Franke, W. Theilmann, Y. Zhang, and R. Sterritt. Towards the autonomic business grid. In Proceedings of the Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASE07), pages 107-112, Los Alamitos, CA, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASE07)
, pp. 107-112
-
-
Franke, C.1
Theilmann, W.2
Zhang, Y.3
Sterritt, R.4
-
12
-
-
19944362008
-
Smartfrog: Configuration and automatic ignition of distributed applications
-
Technical report, HP, 2003
-
P. Goldsack, J. Guijarro, A. Lain, G. Mecheneau, P. Murray, and P. Toft. Smartfrog: Configuration and automatic ignition of distributed applications. Technical report, HP, 2003.
-
-
-
Goldsack, P.1
Guijarro, J.2
Lain, A.3
Mecheneau, G.4
Murray, P.5
Toft, P.6
-
13
-
-
4243121902
-
A framework for using insurance for cyber-risk management
-
L. A. Gordon, M. P. Loeb, and T. Sohail. A framework for using insurance for cyber-risk management. Communications of the ACM, 46(3):81-85, 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.3
, pp. 81-85
-
-
Gordon, L.A.1
Loeb, M.P.2
Sohail, T.3
-
14
-
-
34250776507
-
-
Y. Karabulut, F. Kerschbaum, F. Massacci, P. Robinson, and A. Yautsiukhin. Security and trust in it business outsourcing: a manifesto. Electron. Notes Theoretical Computer Science, 179:47-58, 2007.
-
Y. Karabulut, F. Kerschbaum, F. Massacci, P. Robinson, and A. Yautsiukhin. Security and trust in it business outsourcing: a manifesto. Electron. Notes Theoretical Computer Science, 179:47-58, 2007.
-
-
-
-
16
-
-
0037253062
-
The vision of autonomic computing
-
J. O. Kephart and D. M. Chess. The vision of autonomic computing. Computer, 36(1):41-50, 2003.
-
(2003)
Computer
, vol.36
, Issue.1
, pp. 41-50
-
-
Kephart, J.O.1
Chess, D.M.2
-
20
-
-
33744956513
-
Template-based automated service provisioning - supporting the agreement-driven service life-cycle
-
Proceedings of the 3rd international conference on Service-Oriented Computing 2005 ICSOC, of, Springer
-
H. Ludwig, H. Gimpel, A. Dan, and R. Kearney. Template-based automated service provisioning - supporting the agreement-driven service life-cycle. In Proceedings of the 3rd international conference on Service-Oriented Computing 2005 (ICSOC), volume 3826 of Lecture Notes in Computer Science, pages 283-295. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3826
, pp. 283-295
-
-
Ludwig, H.1
Gimpel, H.2
Dan, A.3
Kearney, R.4
-
21
-
-
33750332662
-
Reliable orchestration of resources using ws-agreement
-
H. Ludwig, T. Nakata, O. Wäldrich, P. Wieder, and W. Ziegler. Reliable orchestration of resources using ws-agreement. In Proceedings of the second International Conference on High Performance Computing and Communications, pages 753-762, 2006.
-
(2006)
Proceedings of the second International Conference on High Performance Computing and Communications
, pp. 753-762
-
-
Ludwig, H.1
Nakata, T.2
Wäldrich, O.3
Wieder, P.4
Ziegler, W.5
-
22
-
-
84879848814
-
Application and analysis of the virtual machine approach to information system security and isolation
-
ACM
-
S. Madnick and J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation. In Proceedings of the workshop on virtual computer systems, pages 210-224. ACM, 1973.
-
(1973)
Proceedings of the workshop on virtual computer systems
, pp. 210-224
-
-
Madnick, S.1
Donovan, J.2
-
23
-
-
37849054252
-
Quantifying the performance isolation properties of virtualization systems
-
ACM
-
J. N. Matthews, W. Hu, M. Hapuarachchi, T. Deshane, D. Dimatos, G. Hamilton, M. McCabe, and J. Owens. Quantifying the performance isolation properties of virtualization systems. In ExpCS '07: Proceedings of the 2007 workshop on Experimental computer science, page 6. ACM, 2007.
-
(2007)
ExpCS '07: Proceedings of the 2007 workshop on Experimental computer science
, pp. 6
-
-
Matthews, J.N.1
Hu, W.2
Hapuarachchi, M.3
Deshane, T.4
Dimatos, D.5
Hamilton, G.6
McCabe, M.7
Owens, J.8
-
24
-
-
50149098917
-
-
O. G. F. (OGF). Web services agreement specification (ws-agreement). OGF Specification, 2006.
-
O. G. F. (OGF). Web services agreement specification (ws-agreement). OGF Specification, 2006.
-
-
-
-
25
-
-
77955866244
-
An empirical study into the security exposure to hosts of hostile virtualized environments
-
CanSecWest
-
T. Ormandy. An empirical study into the security exposure to hosts of hostile virtualized environments. In CanSecWest '07: Applied Security Conference. CanSecWest, 2007.
-
(2007)
CanSecWest '07: Applied Security Conference
-
-
Ormandy, T.1
-
26
-
-
33746427154
-
Virtualization of service gateways in multi-provider environments
-
Y. Royon, S. Frénot, and F. L. Mouel. Virtualization of service gateways in multi-provider environments. In CBSE, pages 385-392, 2006.
-
(2006)
CBSE
, pp. 385-392
-
-
Royon, Y.1
Frénot, S.2
Mouel, F.L.3
-
27
-
-
50149103364
-
Insurance and the computer industry
-
B. Schneier. Insurance and the computer industry. Communications of the ACM, 44(3):114-115, 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.3
, pp. 114-115
-
-
Schneier, B.1
-
28
-
-
0142091714
-
Turning software into a service
-
M. Turner, D. Budgen, and P. Brereton. Turning software into a service. Computer, 36(10):38-44, 2003.
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 38-44
-
-
Turner, M.1
Budgen, D.2
Brereton, P.3
-
29
-
-
50149122539
-
Virtual organization management in xtreemos: An overview
-
Springer, August
-
E. Y. Yang, B. Matthews, A. Lakhani, Y. Jegou, C. Morin, O. D. Sanchez, C. Franke, P. Robinson, A. Hohl, B. Scheuermann, D. Vladusic, H. Yu, A. Qin, R. Lee, E. Focht, and M. Coppola. Virtual organization management in xtreemos: An overview. In Proceedings of the CoreGRID Symposium 2007 Rennes, France (CoreGRID07), pages 73-82. Springer, August 2007.
-
(2007)
Proceedings of the CoreGRID Symposium 2007 Rennes, France (CoreGRID07)
, pp. 73-82
-
-
Yang, E.Y.1
Matthews, B.2
Lakhani, A.3
Jegou, Y.4
Morin, C.5
Sanchez, O.D.6
Franke, C.7
Robinson, P.8
Hohl, A.9
Scheuermann, B.10
Vladusic, D.11
Yu, H.12
Qin, A.13
Lee, R.14
Focht, E.15
Coppola, M.16
|