메뉴 건너뛰기




Volumn , Issue , 2008, Pages 131-142

Autonomic provisioning of hosted applications with level of isolation terms

Author keywords

[No Author keywords available]

Indexed keywords

CHLORINE COMPOUNDS; EXPOSURE CONTROLS; MECHANISMS; RELIABILITY; SATELLITE COMMUNICATION SYSTEMS; TECHNOLOGY;

EID: 50149102863     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EASe.2008.21     Document Type: Conference Paper
Times cited : (4)

References (29)
  • 1
    • 34250009730 scopus 로고    scopus 로고
    • Cyberinsurance in it security management
    • W. S. Baer and A. Parkinson. Cyberinsurance in it security management. IEEE Security and Privacy, 5(3):50-56, 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 50-56
    • Baer, W.S.1    Parkinson, A.2
  • 4
    • 50149105841 scopus 로고    scopus 로고
    • C. Ernemann and R. Yahyapour. Grid Resource Management - State of the Art and Future Trends, chapter Applying Economic Scheduling Methods to Grid Environments, pages 491-506. Kluwer Academic Publishers, 2003.
    • C. Ernemann and R. Yahyapour. "Grid Resource Management - State of the Art and Future Trends", chapter "Applying Economic Scheduling Methods to Grid Environments", pages 491-506. Kluwer Academic Publishers, 2003.
  • 8
    • 38049044908 scopus 로고    scopus 로고
    • On business grid demands and approaches
    • Proceedings of the 4th International Workshop on Grid Economics and Business Models GECON 2007, of, Springer
    • C. Franke, A. Hohl, P. Robinson, and B. Scheuermann. On business grid demands and approaches. In Proceedings of the 4th International Workshop on Grid Economics and Business Models (GECON 2007), volume 4685 of Lecture Notes in Computer Science, pages 124-135. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4685 , pp. 124-135
    • Franke, C.1    Hohl, A.2    Robinson, P.3    Scheuermann, B.4
  • 12
    • 19944362008 scopus 로고    scopus 로고
    • Smartfrog: Configuration and automatic ignition of distributed applications
    • Technical report, HP, 2003
    • P. Goldsack, J. Guijarro, A. Lain, G. Mecheneau, P. Murray, and P. Toft. Smartfrog: Configuration and automatic ignition of distributed applications. Technical report, HP, 2003.
    • Goldsack, P.1    Guijarro, J.2    Lain, A.3    Mecheneau, G.4    Murray, P.5    Toft, P.6
  • 13
    • 4243121902 scopus 로고    scopus 로고
    • A framework for using insurance for cyber-risk management
    • L. A. Gordon, M. P. Loeb, and T. Sohail. A framework for using insurance for cyber-risk management. Communications of the ACM, 46(3):81-85, 2003.
    • (2003) Communications of the ACM , vol.46 , Issue.3 , pp. 81-85
    • Gordon, L.A.1    Loeb, M.P.2    Sohail, T.3
  • 14
    • 34250776507 scopus 로고    scopus 로고
    • Y. Karabulut, F. Kerschbaum, F. Massacci, P. Robinson, and A. Yautsiukhin. Security and trust in it business outsourcing: a manifesto. Electron. Notes Theoretical Computer Science, 179:47-58, 2007.
    • Y. Karabulut, F. Kerschbaum, F. Massacci, P. Robinson, and A. Yautsiukhin. Security and trust in it business outsourcing: a manifesto. Electron. Notes Theoretical Computer Science, 179:47-58, 2007.
  • 16
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • J. O. Kephart and D. M. Chess. The vision of autonomic computing. Computer, 36(1):41-50, 2003.
    • (2003) Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.O.1    Chess, D.M.2
  • 20
    • 33744956513 scopus 로고    scopus 로고
    • Template-based automated service provisioning - supporting the agreement-driven service life-cycle
    • Proceedings of the 3rd international conference on Service-Oriented Computing 2005 ICSOC, of, Springer
    • H. Ludwig, H. Gimpel, A. Dan, and R. Kearney. Template-based automated service provisioning - supporting the agreement-driven service life-cycle. In Proceedings of the 3rd international conference on Service-Oriented Computing 2005 (ICSOC), volume 3826 of Lecture Notes in Computer Science, pages 283-295. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3826 , pp. 283-295
    • Ludwig, H.1    Gimpel, H.2    Dan, A.3    Kearney, R.4
  • 22
    • 84879848814 scopus 로고
    • Application and analysis of the virtual machine approach to information system security and isolation
    • ACM
    • S. Madnick and J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation. In Proceedings of the workshop on virtual computer systems, pages 210-224. ACM, 1973.
    • (1973) Proceedings of the workshop on virtual computer systems , pp. 210-224
    • Madnick, S.1    Donovan, J.2
  • 24
    • 50149098917 scopus 로고    scopus 로고
    • O. G. F. (OGF). Web services agreement specification (ws-agreement). OGF Specification, 2006.
    • O. G. F. (OGF). Web services agreement specification (ws-agreement). OGF Specification, 2006.
  • 25
    • 77955866244 scopus 로고    scopus 로고
    • An empirical study into the security exposure to hosts of hostile virtualized environments
    • CanSecWest
    • T. Ormandy. An empirical study into the security exposure to hosts of hostile virtualized environments. In CanSecWest '07: Applied Security Conference. CanSecWest, 2007.
    • (2007) CanSecWest '07: Applied Security Conference
    • Ormandy, T.1
  • 26
    • 33746427154 scopus 로고    scopus 로고
    • Virtualization of service gateways in multi-provider environments
    • Y. Royon, S. Frénot, and F. L. Mouel. Virtualization of service gateways in multi-provider environments. In CBSE, pages 385-392, 2006.
    • (2006) CBSE , pp. 385-392
    • Royon, Y.1    Frénot, S.2    Mouel, F.L.3
  • 27
    • 50149103364 scopus 로고    scopus 로고
    • Insurance and the computer industry
    • B. Schneier. Insurance and the computer industry. Communications of the ACM, 44(3):114-115, 2001.
    • (2001) Communications of the ACM , vol.44 , Issue.3 , pp. 114-115
    • Schneier, B.1
  • 28
    • 0142091714 scopus 로고    scopus 로고
    • Turning software into a service
    • M. Turner, D. Budgen, and P. Brereton. Turning software into a service. Computer, 36(10):38-44, 2003.
    • (2003) Computer , vol.36 , Issue.10 , pp. 38-44
    • Turner, M.1    Budgen, D.2    Brereton, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.