-
2
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
January
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: Towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
-
(2009)
ACM SIGCOMM Computer Communication Review
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
4
-
-
78650096628
-
Understanding cloud computing vulnerabilities
-
G. B., W. T., and S. E., "Understanding cloud computing vulnerabilities," IEEE Security and Privacy, 2010.
-
(2010)
IEEE Security and Privacy
-
-
-
5
-
-
84861525002
-
Efficient resource management for cloud computing environments
-
978-1-4244-7614-5/10
-
A. J. Younge, G. von Laszewski, L. Wang, S. Lopez-Alarcon, and W. Carithers, "Efficient resource management for cloud computing environments," IEEE, no. 978-1-4244-7614-5/10, 2010.
-
(2010)
IEEE
-
-
Younge, A.J.1
Von Laszewski, G.2
Wang, L.3
Lopez-Alarcon, S.4
Carithers, W.5
-
7
-
-
84890069861
-
Iso/iec 27000-information technology-security techniques-information security management systems-requirements
-
ISO/IEC.
-
ISO/IEC. (2009) Iso/iec 27000-information technology-security techniques-information security management systems-requirements. international organization for standartization.
-
(2009)
International Organization for Standartization
-
-
-
10
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
ser. GCE '08, November 2008
-
I. Foster, Y. Zhao, I. Raicu, and L. Shiyong, "Cloud computing and grid computing 360-degree compared," in Grid Computing Environments Workshop, 2008, ser. GCE '08, November 2008, pp. 1-10.
-
(2008)
Grid Computing Environments Workshop
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Shiyong, L.4
-
11
-
-
84857340127
-
Sla-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions
-
(CSC 2011, IEEE Press, USA)
-
R. Buyya, S. K. Garg, and R. N. Calheiros, "Sla-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions," Proceedings of the 2011 IEEE, International Conference on Cloud and Service Computing (CSC 2011, IEEE Press, USA), 2011.
-
(2011)
Proceedings of the 2011 IEEE, International Conference on Cloud and Service Computing
-
-
Buyya, R.1
Garg, S.K.2
Calheiros, R.N.3
-
12
-
-
77953032795
-
Sla perspective in security management for cloud computing
-
ser. ICNS'10. IEEE Computer Society, March
-
F. R. Lamin, C. B. Westphall, and S. A. de Chaves, "Sla perspective in security management for cloud computing," in Sixth International Conference on Networking and Services, ser. ICNS'10. IEEE Computer Society, March 2010, pp. 212-217.
-
(2010)
Sixth International Conference on Networking and Services
, pp. 212-217
-
-
Lamin, F.R.1
Westphall, C.B.2
De Chaves, S.A.3
-
13
-
-
77953039405
-
Sec-sla: Specification and validation of metrics for service level agreements oriented to security
-
RS: SBC
-
R. R. Righi, F. R. Pellissari, and C. B. Westphall, "Sec-sla: specification and validation of metrics for service level agreements oriented to security," in IV Workshop in Computer Security System. Porto Alegre, RS: SBC, 2004, pp. 199-210.
-
(2004)
IV Workshop in Computer Security System. Porto Alegre
, pp. 199-210
-
-
Righi, R.R.1
Pellissari, F.R.2
Westphall, C.B.3
-
15
-
-
78149373146
-
Formal approach to security metrics.: What does
-
Companion Volume
-
L. Krautsevich, F. Martinelli, and A. Yautsiukhin, "Formal approach to security metrics.: what does "more secure" mean for you?" Proceedings of the Fourth European Conference on Software Architecture-ECSA '10, vol. Companion Volume, pp. 162-169, 2010.
-
(2010)
Proceedings of the Fourth European Conference on Software Architecture-ECSA '10
, pp. 162-169
-
-
Krautsevich, L.1
Martinelli, F.2
Yautsiukhin, A.3
-
16
-
-
84880274363
-
Multilevel security and quality of protection
-
Springer US
-
S. N. Foley, S. Bistarelli, B. O'Sullivan, J. Herbert, and G. Swart, "Multilevel security and quality of protection," in QUALITY OF PROTECTION-Security Measurements and Metrics, ser. Part 3, vol. 23. Springer US, 2006, pp. 93-105.
-
(2006)
QUALITY of PROTECTION-Security Measurements and Metrics, Ser.
, vol.23
, Issue.PART 3
, pp. 93-105
-
-
Foley, S.N.1
Bistarelli, S.2
O'sullivan, B.3
Herbert, J.4
Swart, G.5
-
19
-
-
78149392355
-
A security metrics taxonomization model for software-intensive systems
-
-, "A security metrics taxonomization model for software-intensive systems," Journal of Information Processing Systems, vol. 5, p. 197, 2009.
-
(2009)
Journal of Information Processing Systems
, vol.5
, pp. 197
-
-
-
21
-
-
84862676002
-
A systematic review of information security governance frameworks in the cloud computing environment
-
O. Rebollo, D. Mellado, and E. Fernndez-Medina, "A systematic review of information security governance frameworks in the cloud computing environment," Journal of Universal Computer Science, vol. 18, pp. 798-815, 2012.
-
(2012)
Journal of Universal Computer Science
, vol.18
, pp. 798-815
-
-
Rebollo, O.1
Mellado, D.2
Fernndez-Medina, E.3
-
22
-
-
77957943658
-
Integrating resource consumption and allocation for infrastructure resources on-demand
-
Y. Zhang, G. Huang, X. Liu, and H. Mei, "Integrating resource consumption and allocation for infrastructure resources on-demand," IEEE 3rd International Conference on Cloud Computing, 2010.
-
(2010)
IEEE 3rd International Conference on Cloud Computing
-
-
Zhang, Y.1
Huang, G.2
Liu, X.3
Mei, H.4
-
23
-
-
77957945966
-
Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis
-
978-0-7695-4130-3/10
-
Y. O. Yazr, C. Matthews, R. Farahbod, S. Neville, A. Guitouni, S. Ganti, and Y. Coady, "Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis," 3rd International Conference on Cloud Computing-IEEE, no. 978-0-7695-4130-3/10, pp. 91-98, 2010.
-
(2010)
3rd International Conference on Cloud Computing-IEEE
, pp. 91-98
-
-
Yazr, Y.O.1
Matthews, C.2
Farahbod, R.3
Neville, S.4
Guitouni, A.5
Ganti, S.6
Coady, Y.7
-
24
-
-
84880275672
-
Utility functions in autonomic systems in icac 04 proceedings of the first international conference on autonomic computing
-
W. E. Walsh, G. Tesauro, J. O. Kephart, and R. Das, "Utility functions in autonomic systems in icac 04," Proceedings of the first international conference on autonomic computing, IEEE Computer Society, p. 7077, 2004.
-
(2004)
IEEE Computer Society
, pp. 7077
-
-
Walsh, W.E.1
Tesauro, G.2
Kephart, J.O.3
Das, R.4
-
25
-
-
67650077414
-
Entropy: A consolidation manager for clusters, in vee09: Proceedings of the 2009
-
F. Hermenier, X. Lorca, J. M. Menaud, G. Muller, and J. Lawall, "Entropy: A consolidation manager for clusters, in vee09: Proceedings of the 2009," ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, p. 4150, 2009.
-
(2009)
ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 4150
-
-
Hermenier, F.1
Lorca, X.2
Menaud, J.M.3
Muller, G.4
Lawall, J.5
|