-
1
-
-
49149119622
-
Computing in the clouds
-
Dec.
-
A. Weiss, "Computing in the clouds," Networker, ACM, vol. 11(4), Dec. 2007, pp. 16-25.
-
(2007)
Networker, ACM
, vol.11
, Issue.4
, pp. 16-25
-
-
Weiss, A.1
-
2
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
GCE 2008, IEEE Press, Nov.
-
I. Foster, Y. Zhao, I. Raicu and S. Y. Lu, "Cloud Computing and Grid Computing 360-degree compared," Proc. Grid Computing Environments Workshop, GCE 2008, IEEE Press, Nov. 2008, pp. 1-10.
-
(2008)
Proc. Grid Computing Environments Workshop
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.Y.4
-
3
-
-
77954051808
-
Presentation on effective and secure use of cloud computing paradigm
-
Information Technology Laboratory Oct.
-
P. Mell and T. Grance, "Presentation on effective and secure use of cloud computing paradigm," National Institute of Standards and Technology, Information Technology Laboratory, http://csrc.nist.gov/groups/SNS/cloud- computing/index.html, Oct. 2009.
-
(2009)
National Institute of Standards and Technology
-
-
Mell, P.1
Grance, T.2
-
5
-
-
68649085917
-
Security dynamics of cloud computing
-
Jun.-Jul.
-
K.M. Khan, "Security dynamics of cloud computing," Cutter IT Journal, vol. 22(6-7), Jun.-Jul. 2009, pp. 38-43.
-
(2009)
Cutter IT Journal
, vol.22
, Issue.6-7
, pp. 38-43
-
-
Khan, K.M.1
-
6
-
-
70149089438
-
An architecture for virtual solution composition and deployment in infrastructure clouds
-
IEEE Press, Jun.
-
A. Konstantinou, T. Eilam, M. Kalantar, A. A. Totok, W. Arnold and E. Snible, "An architecture for virtual solution composition and deployment in infrastructure clouds," Proc. 3rd International Workshop on Virtualization Technologies in Distributed Computing, VTDC'09, IEEE Press, Jun. 2009, pp. 9-17.
-
(2009)
Proc. 3rd International Workshop on Virtualization Technologies in Distributed Computing, VTDC'09
, pp. 9-17
-
-
Konstantinou, A.1
Eilam, T.2
Kalantar, M.3
Totok, A.A.4
Arnold, W.5
Snible, E.6
-
7
-
-
85024271255
-
The evolution of virtualization
-
Mar.
-
K.L. Kroeker, "The evolution of virtualization," Communications of the ACM, vol. 52(3), Mar. 2009, pp. 18-20.
-
(2009)
Communications of the ACM
, vol.52
, Issue.3
, pp. 18-20
-
-
Kroeker, K.L.1
-
8
-
-
74349113474
-
On technical security issues in cloud computing
-
CLOUD 2009, IEEE Press, Sep.
-
M. Jensen, J. Schwenk, N. Gruschka and L. L. Iacono, "On technical security issues in cloud computing," Proc. 2009 IEEE International Conference on Cloud Computing, CLOUD 2009, IEEE Press, Sep. 2009, pp. 109-116.
-
(2009)
Proc. 2009 IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
9
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
ESORICS 2009, IEEE Press, Sep.
-
Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," Proc. 14th European Symposium on Research in Computer Security, ESORICS 2009, IEEE Press, Sep. 2009, pp. 355-370.
-
(2009)
Proc. 14th European Symposium on Research in Computer Security
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
10
-
-
71749113079
-
Identity-based authentication for cloud computing
-
CloudCom 2009, IEEE Press, Dec.
-
H. Li, Y. Dai, L. Tian and H. Yang, "Identity-based authentication for cloud computing," Proc. 1st International Conference on Cloud Computing, CloudCom 2009, IEEE Press, Dec. 2009, pp. 157-166.
-
(2009)
Proc. 1st International Conference on Cloud Computing
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
11
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
CloudCom IEEE Press, Dec. 2009
-
L. Yan, C. Rong and G. Zhao, "Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography," Proc. 1st International Conference on Cloud Computing, CloudCom 2009, IEEE Press, Dec. 2009, pp. 167-177.
-
(2009)
Proc. 1st International Conference on Cloud Computing
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
12
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Jan.-Mar.
-
A. Algirdas, L. Jean-Claude, R. Brian and L. Carl, "Basic concepts and taxonomy of dependable and secure computing," IEEE Transactions on Dependable and Secure Computing, vol. 1 (1), Jan.-Mar. 2004, pp. 11-33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Algirdas, A.1
Jean-Claude, L.2
Brian, R.3
Carl, L.4
-
13
-
-
67651046905
-
A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability
-
Feb.
-
M. Al-Kuwaiti, N. Kyriakopoulos and S. Hussein, "A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability," IEEE Communications Surveys & Tutorials, vol. 11 (2), Feb. 2009, pp. 106-124.
-
(2009)
IEEE Communications Surveys & Tutorials
, vol.11
, Issue.2
, pp. 106-124
-
-
Al-Kuwaiti, M.1
Kyriakopoulos, N.2
Hussein, S.3
-
14
-
-
70350736219
-
Model-driven dependability analysis of virtualization systems
-
ICIS 2009, IEEE Press, Jun.
-
X. Zhang, C. Lin and X. Kong, "Model-driven dependability analysis of virtualization systems," Proc. 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009, IEEE Press, Jun. 2009, pp. 199-204.
-
(2009)
Proc. 8th IEEE/ACIS International Conference on Computer and Information Science
, pp. 199-204
-
-
Zhang, X.1
Lin, C.2
Kong, X.3
-
15
-
-
70549109071
-
Dependability engineering of silent self-stabilizing systems
-
SSS 2009, IEEE Press, Nov.
-
A. Dhama, O. Theel, P. Crouzen, H. Hermanns, R. Wimmer and B. Becker, "Dependability engineering of silent self-stabilizing systems," Proc. 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2009, IEEE Press, Nov. 2009, pp. 238-253.
-
(2009)
Proc. 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
, pp. 238-253
-
-
Dhama, A.1
Theel, O.2
Crouzen, P.3
Hermanns, H.4
Wimmer, R.5
Becker, B.6
-
16
-
-
54849410094
-
Using virtualization to improve durability and portability of industrial applications
-
IEEE INDIN 2008, IEEE Press, Jul.
-
R. Alain, "Using virtualization to improve durability and portability of industrial applications," Proc. 6th IEEE International Conference on Industrial Informatics, IEEE INDIN 2008, IEEE Press, Jul. 2008, pp. 1545-1550.
-
(2008)
Proc. 6th IEEE International Conference on Industrial Informatics
, pp. 1545-1550
-
-
Alain, R.1
-
17
-
-
70449535623
-
System-level virtualization research at oak ridge national laboratory
-
Mar.
-
S. L. Scott, G. Vallée, T. Naughton, A. Tikotekar, C, Engelmann and H. Ong, "System-level virtualization research at Oak Ridge National Laboratory," Future Generation Computer Systems, vol. 26 (3), Mar. 2010, pp. 304-307.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.3
, pp. 304-307
-
-
Scott, S.L.1
Vallée, G.2
Naughton, T.3
Tikotekar, A.4
Engelmann, C.5
Ong, H.6
-
18
-
-
51849093455
-
Architecting dependable and secure systems using virtualization
-
LNCS
-
B. Jansen, H. V. Ramasamy, M. Schunter and A. Tanner, "Architecting dependable and secure systems using virtualization," Architecting Dependable Systems V, vol. 5135 LNCS, 2008, pp. 124-149.
-
(2008)
Architecting Dependable Systems V
, vol.5135
, pp. 124-149
-
-
Jansen, B.1
Ramasamy, H.V.2
Schunter, M.3
Tanner, A.4
-
19
-
-
42949121939
-
Combinatorial performance modelling of toroidal cubes
-
Jan.-Feb.
-
H. H. Hashemi and H. A. Sarbazi, "Combinatorial performance modelling of toroidal cubes," Journal of Systems Architecture, vol. 54 (1-2), Jan.-Feb. 2008, pp. 241-252.
-
(2008)
Journal of Systems Architecture
, vol.54
, Issue.1-2
, pp. 241-252
-
-
Hashemi, H.H.1
Sarbazi, H.A.2
-
20
-
-
72049084751
-
Realistic disturbance modeling using hidden Markov models: Applications in model-based process control
-
Oct.
-
C. W. Wee and J. H. Lee, "Realistic disturbance modeling using Hidden Markov Models: applications in model-based process control," Journal of Process Control, vol.19 (9), Oct. 2009, pp. 1438-1450.
-
(2009)
Journal of Process Control
, vol.19
, Issue.9
, pp. 1438-1450
-
-
Wee, C.W.1
Lee, J.H.2
|