-
1
-
-
84864632235
-
-
Amazon Elastic Compute Cloud (EC2)
-
Amazon Elastic Compute Cloud (EC2) (2009) http://www.amazon.com/ec2/
-
(2009)
-
-
-
2
-
-
84864633989
-
-
Amazon Simple Storage Service
-
Amazon Simple Storage Service (2009) http://aws.amazon.com/s3
-
(2009)
-
-
-
3
-
-
33646514514
-
Bank outsources security to the cloud
-
Anonymous
-
Anonymous (2005) Bank outsources security to the cloud. Commun News 42(12)
-
(2005)
Commun News
, vol.42
, pp. 12
-
-
-
4
-
-
33748948241
-
Bank trusts security to 'the cloud'
-
Anonymous
-
Anonymous (2006) Bank trusts security to 'the cloud'. Commun News 43(9)
-
(2006)
Commun News
, vol.43
, pp. 9
-
-
-
5
-
-
84864633988
-
-
Apache Hadoop
-
Apache Hadoop (2009) http://hadoop.apache.org/
-
(2009)
-
-
-
6
-
-
68249129760
-
-
Technical Report UCB/EECS-2009-2028, EECS Department, University of California, Berkeley
-
Armbrust M., Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2009) Above the clouds: a Berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
10
-
-
84864589306
-
-
CARMEN
-
CARMEN (2009) http://www.carmen.org.uk/
-
(2009)
-
-
-
12
-
-
84864613220
-
-
Cloud CIE Computing Expert Committee Technical report, Chinese Institute of Electronics
-
Cloud CIE Computing Expert Committee (2010) Cloud computing white paper. Technical report, Chinese Institute of Electronics
-
(2010)
Cloud Computing White Paper
-
-
-
13
-
-
84864589307
-
-
Condor DAGman
-
Condor DAGman (2009) http://www.cs.wisc.edu/condor/dagman/
-
(2009)
-
-
-
14
-
-
71849115601
-
Data protection-aware design for cloud services
-
Creese S, Hopkins P, Pearson S, Shen Y (2009) Data protection-aware design for cloud services. In: The first international conference on cloud computing, 2009, pp 119-130
-
(2009)
The First International Conference on Cloud Computing, 2009
, pp. 119-130
-
-
Creese, S.1
Hopkins, P.2
Pearson, S.3
Shen, Y.4
-
15
-
-
37549003336
-
MapReduce: Simplified data processing on large clusters
-
Dean J, Ghemawat S (2008) MapReduce: simplified data processing on large clusters. Commun ACM 51(1):107-113
-
(2008)
Commun ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
16
-
-
84864589304
-
-
Eucalyptus
-
Eucalyptus (2009) http://eucalyptus.cs.ucsb.edu/
-
(2009)
-
-
-
17
-
-
70350666263
-
On building secure SCADA systems using security patterns
-
ACM Press, New York
-
Fernandez EB, Wu J, Larrondo-Petrie MM, Shao Y (2009) On building secure SCADA systems using security patterns. In: CSIIRW '09: proceedings of the 5th annual workshop on cyber security and information intelligence research. ACM Press, New York, pp 1-4
-
(2009)
CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research
, pp. 1-4
-
-
Fernandez, E.B.1
Wu, J.2
Larrondo-Petrie, M.M.3
Shao, Y.4
-
18
-
-
21644437974
-
The google file system
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Ghemawat S, Gobioff H, Leung S-T (2003) The Google File System. SIGOPS Oper Syst Rev 37(5): 29-43 (Pubitemid 40929686)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.-T.3
-
19
-
-
84864633992
-
-
Google App Engine
-
Google App Engine (2009) http://appengine.google.com
-
(2009)
-
-
-
20
-
-
38549147623
-
An analysis of the security patterns landscape
-
IEEE Computer Society, Washington
-
Heyman T, Yskout K, Scandariato R, Joosen W (2007) An analysis of the security patterns landscape. In: SESS '07: proceedings of the third international workshop on software engineering for secure systems. IEEE Computer Society, Washington, p 3
-
(2007)
SESS '07: Proceedings of the Third International Workshop on Software Engineering for Secure Systems
, pp. 3
-
-
Heyman, T.1
Yskout, K.2
Scandariato, R.3
Joosen, W.4
-
21
-
-
71749101660
-
Towards an approach of semantic access control for cloud computing
-
Hu L, Ying S, Jia X, Zhao K (2009) Towards an approach of semantic access control for cloud computing. In: The first international conference on cloud computing, 2009, pp 145-156
-
(2009)
The First International Conference on Cloud Computing
, vol.2009
, pp. 145-156
-
-
Hu, L.1
Ying, S.2
Jia, X.3
Zhao, K.4
-
23
-
-
34548041192
-
Dryad: Distributed data-parallel programs from sequential building blocks
-
DOI 10.1145/1272996.1273005, Operating Systems Review - Proceedings of the 2007 EuroSys Conference
-
Isard M, Budiu M, Yu Y, Birrell A, Fetterly D (2007) Dryad: distributed data-parallel programs from sequential building blocks. In: EuroSys '07: proceedings of the 2nd ACM SIGOPS/EuroSys European conference on computer systems. ACM Press, New York, pp 59-72 (Pubitemid 47281575)
-
(2007)
Operating Systems Review (ACM)
, pp. 59-72
-
-
Isard, M.1
Budiu, M.2
Yu, Y.3
Birrell, A.4
Fetterly, D.5
-
24
-
-
70349309706
-
Data security in the world of cloud computing
-
Kaufman LM (2009) Data security in the world of cloud computing. IEEE Secur Priv 7(4): 61-64
-
(2009)
IEEE Secur Priv
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
26
-
-
38549102227
-
Aplrac: A pattern language for designing and implementing role-based access control
-
Kodituwakku SR, Bertok P, Zhao L (2001) Aplrac: a pattern language for designing and implementing role-based access control. In: EuroPLoP'01, 2001
-
(2001)
EuroPLoP'01, 2001
-
-
Kodituwakku, S.R.1
Bertok, P.2
Zhao, L.3
-
27
-
-
84864589305
-
-
Kupa
-
Kupa (2009) http://meta.cesnet.cz/cms/opencms/en/docs/clouds/
-
(2009)
-
-
-
28
-
-
71749113079
-
Identity-based authentication for cloud computing
-
Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: The first international conference on cloud computing, 2009, pp 157-166
-
(2009)
The First International Conference on Cloud Computing
, vol.2009
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
29
-
-
84864632234
-
-
Microsoft Live Mesh
-
Microsoft Live Mesh (2009) http://www.mesh.com/
-
(2009)
-
-
-
31
-
-
84864613209
-
-
Nimbus
-
Nimbus (2009) http://workspace.globus.org/
-
(2009)
-
-
-
32
-
-
68749116600
-
The eucalyptus open-source cloud-computing system
-
October 2008
-
Nurmi D, Wolski R, Grzegorczyk C, Obertelli G, Soman S, Youseff L, Zagorodnov D (2008) The eucalyptus open-source cloud-computing system. In: Proceedings of cloud computing and its applications, October 2008
-
(2008)
Proceedings of Cloud Computing and Its Applications
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
34
-
-
71749102261
-
A privacy manager for cloud computing
-
Pearson S, Shen Y, Mowbray M
-
Pearson S, Shen Y, Mowbray M (2009) A privacy manager for cloud computing. In: The first international conference on cloud computing, 2009, pp 90-106
-
(2009)
The First International Conference on Cloud Computing
, vol.2009
, pp. 90-106
-
-
-
35
-
-
33750938846
-
Towards a security architecture for vehicular ad hoc networks
-
DOI 10.1109/ARES.2006.136, 1625333, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
Plobl K, Nowey T, Mletzko C (2006) Towards a security architecture for vehicular ad hoc networks. In: ARES '06: proceedings of the first international conference on availability, reliability and security. IEEE Computer Society, Washington, pp 374-381 (Pubitemid 44732667)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 374-381
-
-
Plossl, K.1
Nowey, T.2
Mletzko, C.3
-
37
-
-
84864613206
-
-
Salesforce
-
Salesforce (2009) http://www.salesforce.com/
-
(2009)
-
-
-
38
-
-
12344316119
-
-
Wiley, New York
-
Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P (2006) Security patterns. Wiley, New York
-
(2006)
Security Patterns
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
40
-
-
84925452156
-
Search-as-a-service: Outsourced search over outsourced storage
-
doi:10.1145/1594173.1594175
-
Singh A, Srivatsa M, Liu L (2009) Search-as-a-service: outsourced search over outsourced storage. ACM Trans Web 3(4). doi:10.1145/1594173.1594175
-
(2009)
ACM Trans Web
, vol.3
, pp. 4
-
-
Singh, A.1
Srivatsa, M.2
Liu, L.3
-
41
-
-
71749117758
-
Availability analysis of a scalable intrusion tolerant architecture with two detection modes
-
Uemura T, Dohi T, Kaio N (2009) Availability analysis of a scalable intrusion tolerant architecture with two detection modes. In: The first international conference on cloud computing, 2009, pp 178-189
-
(2009)
The First International Conference on Cloud Computing
, vol.2009
, pp. 178-189
-
-
Uemura, T.1
Dohi, T.2
Kaio, N.3
-
42
-
-
84864633987
-
-
Wispy
-
Wispy (2009) A cloud computing testbed, http://www.rcac.purdue.edu/ teragrid/resources/#wispy
-
(2009)
A Cloud Computing Testbed
-
-
-
43
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
Yan L, Rong C, Zhao G (2009) Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: The first international conference on cloud computing, 2009, pp 167-177
-
(2009)
The First International Conference on Cloud Computing
, vol.2009
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
44
-
-
34548122074
-
Architectural patterns for enabling application security
-
Yoder J, Barcalow J (1997) Architectural patterns for enabling application security. In: PLo P, 1997
-
(1997)
PLo P
, vol.1997
-
-
Yoder, J.1
Barcalow, J.2
-
45
-
-
77956949826
-
An enhanced security architecture for wireless sensor network
-
World Scientific and Engineering Academy and Society (WSEAS)
-
Youssef SM, Baith Mohamed A, Mikhail MA (2009) An enhanced security architecture for wireless sensor network. In: DNCOCO'09: proceedings of the 8th WSEAS international conference on data networks, communications, computers, Stevens Point, Wisconsin, USA, 2009. World Scientific and Engineering Academy and Society (WSEAS), pp 216-224
-
(2009)
DNCOCO'09: Proceedings of the 8th WSEAS International Conference on Data Networks, Communications, Computers, Stevens Point, Wisconsin, USA, 2009
, pp. 216-224
-
-
Youssef, S.M.1
Baith Mohamed, A.2
Mikhail, M.A.3
-
46
-
-
70350591395
-
DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language
-
San Diego, CA, December 2008
-
Yu Y, Isard M, Fetterly D, Budiu M, Erlingsson Ú, Gunda PK, Currey J (2008) DryadLINQ: a system for general-purpose distributed data-parallel computing using a high-level language. In: Proceedings of the 8th symposium on operating systems design and implementation (OSDI '08), San Diego, CA, December 2008
-
(2008)
Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI '08)
-
-
Yu, Y.1
Isard, M.2
Fetterly, D.3
Budiu, M.4
Erlingsson, Ú.5
Gunda, P.K.6
Currey, J.7
-
47
-
-
71749114896
-
Cloud computing: A statistics aspect of users
-
Jaatun MG, Zhao G, Rong C (eds Springer, Berlin
-
Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye XP, Tang N (2009) Cloud computing: a statistics aspect of users. In: Jaatun MG, Zhao G, Rong C (eds) The first international conference on cloud computing. Lecture notes in computer science, vol 5931. Springer, Berlin, pp 347-358
-
(2009)
The First International Conference on Cloud Computing. Lecture Notes in Computer Science
, vol.5931
, pp. 347-358
-
-
Zhao, G.1
Liu, J.2
Tang, Y.3
Sun, W.4
Zhang, F.5
Ye, X.P.6
Tang, N.7
|