메뉴 건너뛰기




Volumn , Issue , 2010, Pages 672-674

On verifying stateful dataflow processing services in large-scale cloud systems

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; CLOUD SYSTEMS; COLLUDING ATTACK; CONSISTENCY CHECKS; DATAFLOW; INTEGRITY ASSURANCE; PROCESSING SYSTEMS; SENSITIVE APPLICATION; SERVICE INTEGRITY; SERVICE PROVIDER; SYSTEM S; VIRTUAL COMPUTING;

EID: 78650003017     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866393     Document Type: Conference Paper
Times cited : (11)

References (9)
  • 1
    • 78650004904 scopus 로고    scopus 로고
    • Virtual Computing Lab. http://vcl.ncsu.edu/.
  • 2
    • 54049153566 scopus 로고    scopus 로고
    • TVDc: Managing security in the trusted virtual datacenter
    • S. Berger, R. Caceres, and et. al. TVDc: Managing security in the trusted virtual datacenter. ACM SIGOPS Operating Systems Review, 42(1):40-47, 2008.
    • (2008) ACM SIGOPS Operating Systems Review , vol.42 , Issue.1 , pp. 40-47
    • Berger, S.1    Caceres, R.2
  • 4
    • 55649105542 scopus 로고    scopus 로고
    • SPADE: The System S declarative stream processing engine
    • April
    • B. Gedik, H. Andrade, and et. al. SPADE: the System S Declarative Stream Processing Engine. Proc. of SIGMOD, April 2008.
    • (2008) Proc. of SIGMOD
    • Gedik, B.1    Andrade, H.2
  • 5
    • 0037630614 scopus 로고    scopus 로고
    • QoS-Assured service composition in managed service overlay networks
    • X. Gu, K. Nahrstedt, and et. al. QoS-Assured Service Composition in Managed Service Overlay Networks. Proc. Of ICDCS, 194-202, 2003.
    • (2003) Proc. of ICDCS , pp. 194-202
    • Gu, X.1    Nahrstedt, K.2
  • 6
    • 78649990639 scopus 로고    scopus 로고
    • Byzantine modification detection in multicast networks using randomized network coding
    • T. Ho, B. Leong, R. Koetter, and et. al. Byzantine modification detection in multicast networks using randomized network coding. In IEEE ISIT, 2004.
    • (2004) IEEE ISIT
    • Ho, T.1    Leong, B.2    Koetter, R.3
  • 7
    • 85015649873 scopus 로고    scopus 로고
    • Airavat: Security and privacy for mapreduce
    • April
    • I. Roy, S. Setty, and et. al. Airavat: Security and privacy for MapReduce. In NSDI, April 2010.
    • (2010) NSDI
    • Roy, I.1    Setty, S.2
  • 9
    • 41549167232 scopus 로고    scopus 로고
    • A framework for identifying compromised nodes in wireless sensor networks
    • Q. Zhang, T. Yu, and P. Ning. A framework for identifying compromised nodes in wireless sensor networks. ACM TISSEC, 11(3), 2008.
    • (2008) ACM TISSEC , vol.11 , Issue.3
    • Zhang, Q.1    Yu, T.2    Ning, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.