-
1
-
-
79952917659
-
Reservoir - When one cloud is not enough
-
B. Rochwerger, D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, J. Tordsson, C. Ragusa, M. Villari, S. Clayman, E. Levy, A. Maraschini, P. Massonet, H. Munoz, and G. Toffetti, "Reservoir - when one cloud is not enough," Computer, vol. 44, pp. 44-51, 2011.
-
(2011)
Computer
, vol.44
, pp. 44-51
-
-
Rochwerger, B.1
Breitgand, D.2
Epstein, A.3
Hadas, D.4
Loy, I.5
Nagin, K.6
Tordsson, J.7
Ragusa, C.8
Villari, M.9
Clayman, S.10
Levy, E.11
Maraschini, A.12
Massonet, P.13
Munoz, H.14
Toffetti, G.15
-
2
-
-
84863491669
-
Spatial big-data challenges intersecting mobility and cloud computing
-
(New York, NY, USA), ACM
-
S. Shekhar, V. Gunturi, M. R. Evans, and K. Yang, "Spatial big-data challenges intersecting mobility and cloud computing," in Proceedings of the Eleventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, MobiDE '12, (New York, NY, USA), pp. 1-6, ACM, 2012.
-
(2012)
Proceedings of the Eleventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, MobiDE '12
, pp. 1-6
-
-
Shekhar, S.1
Gunturi, V.2
Evans, M.R.3
Yang, K.4
-
3
-
-
84867709299
-
Heterogeneous sensors become homogeneous things in smart cities
-
july
-
M. Fazio, M. Paone, A. Puliafito, and M. Villari, "Heterogeneous sensors become homogeneous things in smart cities," in Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, july 2012.
-
(2012)
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on
-
-
Fazio, M.1
Paone, M.2
Puliafito, A.3
Villari, M.4
-
4
-
-
84875612910
-
-
OASIS XRI Data Interchange (XDI) TC: https://www.oasis-open.org/ committees/xdi.
-
-
-
-
5
-
-
84875635958
-
-
Higgins Personal Data Service
-
2012. Higgins Personal Data Service: http://www.eclipse.org/higgins/.
-
(2012)
-
-
-
6
-
-
84875629789
-
-
OASIS Security Services (SAML) TC
-
OASIS Security Services (SAML) TC. https://www.oasis-open.org/committees/ security.
-
-
-
-
7
-
-
84875579477
-
An xdi-based approach to represent and exchange data between federated clouds
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "An xdi-based approach to represent and exchange data between federated clouds," Advances in Internet Technology, vol. 5, no. 1-2, pp. 11-14, 2012.
-
(2012)
Advances in Internet Technology
, vol.5
, Issue.1-2
, pp. 11-14
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
8
-
-
84875587785
-
-
OASIS Identity Metasystem Interoperability (IMI) TC. https://www.oasis- open.org/committees/imi.
-
-
-
-
9
-
-
77955905901
-
Security and cloud computing: Intercloud identity management infrastructure
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Security and cloud computing: Intercloud identity management infrastructure," in WETICE, pp. 263-265, 2010.
-
(2010)
WETICE
, pp. 263-265
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
10
-
-
84875589739
-
-
Bouncy Castle Crypto APIs: http://www.bouncycastle.org/.
-
-
-
-
11
-
-
77957951132
-
How to enhance cloud architectures to enable cross-federation
-
IEEE, July
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "How to enhance cloud architectures to enable cross-federation," in Proceedings of IEEE CLOUD '10, pp. 337-345, IEEE, July 2010.
-
(2010)
Proceedings of IEEE CLOUD '10
, pp. 337-345
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
12
-
-
84866614507
-
Large-scale context provisioning: A use-case for homogenous cloud federation
-
july
-
S. Kiani, A. Anjum, N. Bessis, and R. Hill, "Large-scale context provisioning: A use-case for homogenous cloud federation," in Complex, Intelligent and Software Intensive Systems (CISIS), 2012 Sixth International Conference on, pp. 241-248, july 2012.
-
(2012)
Complex, Intelligent and Software Intensive Systems (CISIS), 2012 Sixth International Conference on
, pp. 241-248
-
-
Kiani, S.1
Anjum, A.2
Bessis, N.3
Hill, R.4
-
13
-
-
77957962863
-
Characterizing cloud federation for enhancing providers' profit
-
july
-
I. Goiri, J. Guitart, and J. Torres, "Characterizing cloud federation for enhancing providers' profit," in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, pp. 123 -130, july 2010.
-
(2010)
Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on
, pp. 123-130
-
-
Goiri, I.1
Guitart, J.2
Torres, J.3
-
15
-
-
84862907810
-
Security challenges for the public cloud
-
jan.-feb.
-
K. Ren, C. Wang, and Q. Wang, "Security challenges for the public cloud," Internet Computing, IEEE, vol. 16, pp. 69 -73, jan.-feb. 2012.
-
(2012)
Internet Computing, IEEE
, vol.16
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
17
-
-
79751493181
-
Locking the sky: A survey on iaas cloud security
-
10.1007/s00607-010-0140-x
-
L. Vaquero, L. Rodero-Merino, and D. Morin, "Locking the sky: a survey on iaas cloud security," Computing, vol. 91, pp. 93-118, 2011. 10.1007/s00607-010-0140-x.
-
(2011)
Computing
, vol.91
, pp. 93-118
-
-
Vaquero, L.1
Rodero-Merino, L.2
Morin, D.3
-
18
-
-
84929445167
-
Towards trusted cloud computing
-
(Berkeley, CA, USA), USENIX Association
-
N. Santos, K. P. Gummadi, and R. Rodrigues, "Towards trusted cloud computing," in Proceedings of the 2009 conference on Hot topics in cloud computing, HotCloud'09, (Berkeley, CA, USA), USENIX Association, 2009.
-
(2009)
Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud'09
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
19
-
-
72949120122
-
Kvmsec: A security extension for linux kernel virtual machines
-
(New York, NY, USA), ACM
-
F. Lombardi and R. Di Pietro, "Kvmsec: a security extension for linux kernel virtual machines," in Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, (New York, NY, USA), pp. 2029-2034, ACM, 2009.
-
(2009)
Proceedings of the 2009 ACM Symposium on Applied Computing, SAC '09
, pp. 2029-2034
-
-
Lombardi, F.1
Di Pietro, R.2
-
20
-
-
84861498357
-
Investigation of it security and compliance challenges in security-asa-service for cloud computing
-
april
-
H. Al-Aqrabi, L. Liu, J. Xu, R. Hill, N. Antonopoulos, and Y. Zhan, "Investigation of it security and compliance challenges in security-asa-service for cloud computing," in Object/Component/Service- Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on, pp. 124 -129, april 2012.
-
(2012)
Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on
, pp. 124-129
-
-
Al-Aqrabi, H.1
Liu, L.2
Xu, J.3
Hill, R.4
Antonopoulos, N.5
Zhan, Y.6
-
21
-
-
79952671882
-
Network security for virtual machine in cloud computing
-
30 2010-dec. 2
-
H. Wu, Y. Ding, C. Winer, and L. Yao, "Network security for virtual machine in cloud computing," in Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, pp. 18 -21, 30 2010-dec. 2 2010.
-
(2010)
Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on
, pp. 18-21
-
-
Wu, H.1
Ding, Y.2
Winer, C.3
Yao, L.4
-
23
-
-
77955797759
-
Cloud computing system based on trusted computing platform
-
may
-
Z. Shen, L. Li, F. Yan, and X. Wu, "Cloud computing system based on trusted computing platform," in Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on, vol. 1, pp. 942-945, may 2010.
-
(2010)
Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on
, vol.1
, pp. 942-945
-
-
Shen, Z.1
Li, L.2
Yan, F.3
Wu, X.4
-
24
-
-
83755178020
-
An overview of the security concerns in enterprise cloud computing
-
vol. abs/1101.5613
-
A. Bisong and S. M. Rahman, "An overview of the security concerns in enterprise cloud computing," CoRR, vol. abs/1101.5613, 2011.
-
(2011)
CoRR
-
-
Bisong, A.1
Rahman, S.M.2
-
25
-
-
84875603485
-
-
2012. Cloud Security Alliance, https://cloudsecurityalliance.org/.
-
(2012)
-
-
|