-
1
-
-
77950601870
-
-
Amazon, "Elastic Compute Cloud (EC2)" http://en.wikipedia.org/ wiki/Amazon-Elastic-Compute-Cloud
-
-
-
-
4
-
-
56349150824
-
Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities
-
R. Buyya, R.; C. S. Yeo; and S. Venugopal, "Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities," 10th IEEE Int'l Conf. on High Perf. Computing and Comm., Sept. 2008
-
10th IEEE Int'l Conf. on High Perf. Computing and Comm., Sept. 2008
-
-
Buyya R, R.1
Yeo, C.S.2
Venugopal, S.3
-
5
-
-
77950610946
-
-
A. Cavoukian, "Privacy in The Clouds",http://www.ipc.on.ca/ image/Resources%5Cprivacyintheclouds.pdf
-
-
-
Cavoukian, A.1
-
6
-
-
36348929372
-
Collaborative Detection of DDoS Attacks over Multiple Network Domains
-
Dec.
-
Y. Chen, K. Hwang, and W. S. Ku, "Collaborative Detection of DDoS Attacks over Multiple Network Domains", IEEE Trans. on Parallel and Distributed Systems , vol. 18, no. 12, Dec. 2007, pp.1649-1662.
-
(2007)
IEEE Trans. on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.S.3
-
8
-
-
70349595440
-
Harnessing Cloud Technologies for a Virtualized Distributed Computing Infrastructure
-
Sept.
-
A. Costanzo, M. Assuncao, and R. Buyya, "Harnessing Cloud Technologies for a Virtualized Distributed Computing Infrastructure", IEEE Internet Computing, Sept. 2009.
-
(2009)
IEEE Internet Computing
-
-
Costanzo, A.1
Assuncao, M.2
Buyya, R.3
-
11
-
-
62949225623
-
Cloud Computing and Grid Computing 360-Degree Compared
-
I. Foster, Ian; Y. Zhao, I. Raicu, and S. Lu, "Cloud Computing and Grid Computing 360-Degree Compared," Grid Computing Environments Workshop, 12-16 Nov. 2008
-
Grid Computing Environments Workshop, 12-16 Nov. 2008
-
-
Foster, I.1
Ian2
Zhao, Y.3
Raicu, I.4
Lu, S.5
-
12
-
-
77950615306
-
Teleworking in Cloud: Security Risks and Services
-
May 15
-
J. Girard and J. Pescatore, " Teleworking in Cloud: Security Risks and Services" - A Gartner Report, May 15 2009.
-
(2009)
A Gartner Report
-
-
Girard, J.1
Pescatore, J.2
-
13
-
-
68249131822
-
-
Google, Inc.
-
Google, Inc. " Google and the Wisdom of Clouds", http://www.businessweek.com/ magazine/content/0752/b4064048925836.htm
-
Google and the Wisdom of Clouds
-
-
-
14
-
-
9744278382
-
A Noval Cloud-Based Trust Model for Pervasive Computing
-
R. He, J. Niu, M. Yuan, and J. Hu, "A Noval Cloud-Based Trust Model for Pervasive Computing", The Fourth International Conference on Computer and Information Technology,Sept. 14-16 2004, pp. 693-700
-
The Fourth International Conference on Computer and Information Technology,Sept. 14-16 2004
, pp. 693-700
-
-
He, R.1
Niu, J.2
Yuan, M.3
Hu, J.4
-
15
-
-
77950618211
-
What you need to know about Cloud computing security and compliance
-
July 13
-
J. Heiser, "What you need to know about Cloud computing security and compliance" - A Gartner Report, July 13, 2009.
-
(2009)
A Gartner Report
-
-
Heiser, J.1
-
17
-
-
33646476351
-
Security Binding and Worm/DDoS Defense Infrastructure for Trusted Grid Computing
-
K. Hwang, et.al., "Security Binding and Worm/DDoS Defense Infrastructure for Trusted Grid Computing," Int'l Journal of Critical Infrastructures, vol. 2, no. 4, 2005.
-
(2005)
Int'l Journal of Critical Infrastructures
, vol.2
, Issue.4
-
-
Hwang, K.1
-
18
-
-
33847743856
-
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
-
Jan-March
-
K. Hwang, et al, "Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes", IEEE Trans. on Dependable and Secure Computing, vol. 4, no. 1, Jan-March, 2007, pp.41-55.
-
(2007)
IEEE Trans. on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
-
19
-
-
67649859519
-
Collusive Piracy Prevention in P2P Content Delivery Networks
-
July
-
X. Lou and K. Hwang, "Collusive Piracy Prevention in P2P Content Delivery Networks", IEEE Trans. on Computers, July 2009.
-
(2009)
IEEE Trans. on Computers
-
-
Lou, X.1
Hwang, K.2
-
20
-
-
20344383743
-
Virtual Machine Monitors: Current Technology and Future Trends
-
May
-
M. Rosenblum and T. Garfinkel, "Virtual Machine Monitors: Current Technology and Future Trends", IEEE Computer, May 2005, pp.39-47.
-
(2005)
IEEE Computer
, pp. 39-47
-
-
Rosenblum, M.1
Garfinkel, T.2
-
21
-
-
30144435160
-
Trusted P2P Transactions with Fuzzy Reputation Aggregation
-
Nov/Dec.
-
S. Song, K. Hwang, R Zhou, and Y.K. Kwok, "Trusted P2P Transactions with Fuzzy Reputation Aggregation", IEEE Internet Computing, Special Issue on Security for P2P and Ad Hoc Networks, Nov/Dec. 2005, pp. 24-34.
-
(2005)
IEEE Internet Computing, Special Issue on Security for P2P and Ad Hoc Networks
, pp. 24-34
-
-
Song, S.1
Hwang, K.2
Zhou, R.3
Kwok, Y.K.4
-
22
-
-
70349456218
-
Virtual Infrastructure Management in Private and Hybrid Clouds
-
Sept.
-
B. Sotomayor, et al, "Virtual Infrastructure Management in Private and Hybrid Clouds", IEEE Internet Computing, Sept. 2009.
-
(2009)
IEEE Internet Computing
-
-
Sotomayor, B.1
-
23
-
-
69349098776
-
Cloud Computing and the Common Man
-
Aug
-
J. Viega, "Cloud Computing and the Common Man", IEEE Computer Magazine, Aug. 2009, pp. 106-108.
-
(2009)
IEEE Computer Magazine
, pp. 106-108
-
-
Viega, J.1
-
25
-
-
50649113248
-
GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks
-
(TKDE), Sept.
-
R. Zhou, K. Hwang, et al, "GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks", IEEE Trans. Knowledge and Data Engineering, (TKDE), Sept. 2008.
-
(2008)
IEEE Trans. Knowledge and Data Engineering
-
-
Zhou, R.1
Hwang, K.2
|