-
1
-
-
30944457507
-
-
International Data Corporation, White Paper, Mar.
-
A. Konary, S. Graham, and L. Seymour, "The future of software licensing: Software licensing under siege," International Data Corporation, White Paper, Mar. 2004.
-
(2004)
The Future of Software Licensing: Software Licensing under Siege
-
-
Konary, A.1
Graham, S.2
Seymour, L.3
-
2
-
-
84950096614
-
Total cost of ownership: An analysis approach for purchasing
-
Ellram and L. M, "Total cost of ownership: an analysis approach for purchasing," International Journal of Physical Distribution and Logistics Management, vol. 25, no. 8, pp. 4-23, 1995.
-
(1995)
International Journal of Physical Distribution and Logistics Management
, vol.25
, Issue.8
, pp. 4-23
-
-
Ellram1
M, L.2
-
3
-
-
84866726138
-
Software as a Service (SaaS) as an outsourcing model: An economic analysis
-
D. C. Chou and A. Y. Chou, "Software as a Service (SaaS) as an outsourcing model: An economic analysis," in Proc. SWDSI'08, Houston, Texas, USA, Mar. 2008, pp. 386-391.
-
Proc. SWDSI'08, Houston, Texas, USA, Mar. 2008
, pp. 386-391
-
-
Chou, D.C.1
Chou, A.Y.2
-
4
-
-
74049112206
-
Cloud security issues
-
B. R. Kandukuri, R. P. V., and A. Rakshit, "Cloud security issues," in Proc. the 2009 IEEE International Conference on Services Computing, Bangalore, India, Sep. 2009, pp. 517-520.
-
Proc. the 2009 IEEE International Conference on Services Computing, Bangalore, India, Sep. 2009
, pp. 517-520
-
-
Kandukuri, B.R.1
V., R.P.2
Rakshit, A.3
-
6
-
-
78449235824
-
-
Mar. Online. Available
-
J. Mann. (2009, Mar.) Google Docs deals with security issue. [Online]. Available: http://www.techspot.com/news/33839-google-docs-deals-with-security- issue.html
-
(2009)
Google Docs Deals with Security Issue
-
-
Mann, J.1
-
8
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in Proc. IWQoS'09, Charleston, South Carolina, USA, 2009.
-
Proc. IWQoS'09, Charleston, South Carolina, USA, 2009
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
9
-
-
58449118012
-
Computing on encrypted data
-
A. Sahai, "Computing on encrypted data," in Proc. ICISS 2008, Hyderabad, India, Dec. 2008, pp. 148-153.
-
Proc. ICISS 2008, Hyderabad, India, Dec. 2008
, pp. 148-153
-
-
Sahai, A.1
-
10
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: A virtual machine-based platform for trusted computing," in Proc. SOSP'03, 2003.
-
Proc. SOSP'03, 2003
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
11
-
-
68249129760
-
-
EECS Department, University of California, Berkeley, Technical Report UCB/EECS-2009-28, Feb. Online. Available
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," EECS Department, University of California, Berkeley, Technical Report UCB/EECS-2009-28, Feb. 2009. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
12
-
-
62949146437
-
Toward a unified ontology of cloud computing
-
L. Youseff, M. Butrico, and D. D. Silva, "Toward a unified ontology of cloud computing," in Proc. Grid Computing Environments Workshop on Supercomputing Conference(SC'08), Austin, Texas, USA, Nov. 2008, pp. 1-10.
-
Proc. Grid Computing Environments Workshop on Supercomputing Conference(SC'08), Austin, Texas, USA, Nov. 2008
, pp. 1-10
-
-
Youseff, L.1
Butrico, M.2
Silva, D.D.3
-
13
-
-
84929445167
-
Towards trusted cloud computing
-
N. Santos, K. P. Gummadi, and R. Rodrigues, "Towards trusted cloud computing," in Proc. HotCloud'09, San Diego, CA, USA, Jun. 2009.
-
Proc. HotCloud'09, San Diego, CA, USA, Jun. 2009
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
14
-
-
0003337018
-
The TLS protocol
-
Jan. [Online]. Available
-
T. Dierks and C. Allen, "The TLS protocol," Internet Engineering Task Force, RFC 2246, Jan. 1999. [Online]. Available: http://www.ietf.org/rfc/rfc2246.txt
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
15
-
-
70349732504
-
Eucalyptus: A technical report on an elastic utility computing architecture linking your programs to useful systems
-
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, "Eucalyptus: A technical report on an elastic utility computing architecture linking your programs to useful systems," UCSB Computer Science, Technical Report 2008-10, 2008.
-
(2008)
UCSB Computer Science, Technical Report 2008-10
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
16
-
-
78449234513
-
-
website. [Online]. Available
-
(2009) The TCG website. [Online]. Available: https://www. trustedcomputinggroup.org
-
(2009)
The TCG
-
-
-
17
-
-
77952329878
-
Improving xen security through disaggregation
-
D. G. Murray, D. G. Murray, and S. Hand, "Improving xen security through disaggregation," in Proc. VEE'08, New York, NY, USA, 2008, pp. 151-160.
-
Proc. VEE'08, New York, NY, USA, 2008
, pp. 151-160
-
-
Murray, D.G.1
Murray, D.G.2
Hand, S.3
-
18
-
-
28544432001
-
Users' security handbook
-
Internet Engineering Task Force Feb. Online. Available
-
E. Guttman, L. Leong, and G. Malkin, "Users' security handbook," Internet Engineering Task Force, RFC 2504, Feb. 1999. [Online]. Available: http://www.rfc-editor.org/rfc/rfc2504.txt
-
(1999)
RFC
, vol.2504
-
-
Guttman, E.1
Leong, L.2
Malkin, G.3
|