-
2
-
-
1942501939
-
-
Open Group, TOGAF 8, Document Nr. 1911, The Open Group, Dec
-
The Open Group, TOGAF 8, The Open Group Architecture Framework Enterprise Edition, Document Nr. 1911, The Open Group. Dec. 2002. URL: http://www.opengroup.org/architecture/togaf
-
(2002)
The Open Group Architecture Framework Enterprise Edition
-
-
-
7
-
-
84891434012
-
-
Pattern
-
Pattern: Cloud Computing, OSA. http://www.opensecurityarchitecture.org/ cms/library/patternlandscape/251-pattern-cloud-computing
-
Cloud Computing, OSA
-
-
-
8
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
Popek, G. J., Goldberg, R. P.: Formal requirements for virtualizable third generation architectures. Commun. ACM 17(7), 412-421 (1974)
-
(1974)
Commun. ACM
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.J.1
Goldberg, R.P.2
-
9
-
-
84891440628
-
-
SHARE 89, Sessions
-
Varian, M.: VM and the VM community, past present, and future, SHARE 89, Sessions 9059-9061. (1977). http://www.princeton.edu/~melinda
-
(1977)
VM and the VM Community, Past Present, and Future
, pp. 9059-9061
-
-
Varian, M.1
-
11
-
-
78649988138
-
-
Windows Azure platform: Microsoft 2010. http://www.microsoft.com/azure/ whatisazure. mspx
-
(2010)
Windows Azure Platform
-
-
-
17
-
-
84891444176
-
-
What is AWS? Amazon, 2010. http://aws.amazon.com/what-is-aws
-
(2010)
What Is AWS? Amazon
-
-
-
20
-
-
78651267925
-
-
University of California at Berkeley, Technical Report No. UCB/EECS-2009-28, 10 Feb
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A, D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., Zaharia, M.: Electrical Engineering and Computer Sciences, University of California at Berkeley, Technical Report No. UCB/EECS-2009-28. 10 Feb. (2009)
-
(2009)
Electrical Engineering and Computer Sciences
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
21
-
-
77954614922
-
-
federated data centers for open source systems and services research, HP Laboratories, HPL-2009-134
-
Campbell, R., Gupta, I., Heath, M., Ko, S. Y., Kozuch, M., Kunze, M., Kwan, T., Lai, K., Lee, H. Y., Lyons, M., Milojicic, D., O'Hallaron, D., Soh, Y. C.: Open cirrus: cloud computing testbed: federated data centers for open source systems and services research, HP Laboratories, HPL-2009-134. (2009)
-
(2009)
Open Cirrus: Cloud Computing Testbed
-
-
Campbell, R.1
Gupta, I.2
Heath, M.3
Ko, S.Y.4
Kozuch, M.5
Kunze, M.6
Kwan, T.7
Lai, K.8
Lee, H.Y.9
Lyons, M.10
Milojicic, D.11
O'Hallaron, D.12
Soh, Y.C.13
-
22
-
-
0036564536
-
Data management and transfer in high-performance computational grid environments
-
Allcock, B., Bester, J., Bresnahan, J., Chervenak, A. L., Foster, I., Kesselman, C., Meder, S., Nefedova, V., Quesnel, D., Tuecke, S.: Data management and transfer in high-performance computational grid environments. Parallel Comput. 28(5), (2002)
-
(2002)
Parallel Comput
, vol.28
, Issue.5
-
-
Allcock, B.1
Bester, J.2
Bresnahan, J.3
Chervenak, A.L.4
Foster, I.5
Kesselman, C.6
Meder, S.7
Nefedova, V.8
Quesnel, D.9
Tuecke, S.10
-
23
-
-
70349750047
-
The eucalyptus open-source cloud-computing system
-
Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L., Zagorodnov, D.: The eucalyptus open-source cloud-computing system. In: 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, pp. 124-131 (2009)
-
(2009)
9th IEEE/ACM International Symposium on Cluster Computing and the Grid, Pp
, pp. 124-131
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
26
-
-
70349752533
-
-
Amazon Web Services: Amazon. http://aws.amazon.com/(2010)
-
(2010)
Amazon Web Services
-
-
-
30
-
-
84891405332
-
-
Enterprise Cloud Buyers Council. TM Forum, http://www.tmforum.org/ EnterpriseCloudBuyers/8009/home.html (2010)
-
(2010)
Enterprise Cloud Buyers Council
-
-
-
31
-
-
84891397970
-
-
Open Virtualization Format OVF-DMTF Standard for packaging and distributing virtual appliances, DMTF, Sept
-
Enabling Portability & Simplified Deployment of Virtual Appliances: Open Virtualization Format (OVF)-DMTF Standard for packaging and distributing virtual appliances, DMTF, Sept 2008
-
(2008)
Enabling Portability & Simplified Deployment of Virtual Appliances
-
-
-
35
-
-
84891377970
-
-
Net-centric. http://en. wikipedia.org/wiki/Net-centric
-
-
-
-
38
-
-
84891477536
-
-
19 Sept 2006
-
Ciccarelli, D.: Web 2.0 Definition. http://blogs.voices.com/thebiz/2006/ 09/web-20-definition.html (2006). 19 Sept 2006
-
(2006)
Web 2.0 Definition
-
-
Ciccarelli, D.1
-
40
-
-
84891450084
-
-
Chapter 7, Web 2.0 Architectures, O'Reilly
-
Governor, J., Nickull, D., Hinchcliffe, D. Specific patterns of Web 2.0: Chapter 7-Web 2.0 Architectures, O'Reilly. http://oreilly.com/web2/excerpts/ 9780596514433/specific-patternsweb20.html
-
Specific Patterns of Web 2.0
-
-
Governor, J.1
Nickull, D.2
Hinchcliffe, D.3
-
41
-
-
84891471593
-
-
25 July 2007
-
The future is smart machines. NESTA. http://blogs.nesta.org.uk/ innovation/2007/07/thefuture-is-s.html (2007). 25 July 2007
-
(2007)
The Future Is Smart Machines
-
-
-
44
-
-
84891480802
-
-
http://csrc.nist.gov/groups/SNS/Cloud-computing/index.html
-
-
-
-
45
-
-
84891468939
-
How the cloud stretches the SOA scope, MSDN architecture center
-
Lakshmanan, G., Pande, M.: How the Cloud stretches the SOA scope, MSDN architecture center. Arch J, http://msdn. microsoft.com/en-us/architecture/ aa699420.aspx
-
Arch J
-
-
Lakshmanan, G.1
Pande, M.2
-
48
-
-
0041460684
-
-
April
-
Cerf, V., Burleigh, S., Hooke, A., Durst, R., Scott, K., Fall, K., Weiss, H.: Delay-tolerant networking architecture, IETF. April 2007. http://www.ietf.org/rfc/rfc4838.txt
-
(2007)
Delay-tolerant Networking Architecture, IETF
-
-
Cerf, V.1
Burleigh, S.2
Hooke, A.3
Durst, R.4
Scott, K.5
Fall, K.6
Weiss, H.7
-
50
-
-
84891457572
-
-
21 July 2008
-
Wayner, P.: Cloud versus cloud: A guided tour of Amazon, Google, AppNexus, and GoGrid, InfoWorld. http://www.infoworld.com/d/Cloud-computing/ Cloud-versus-Cloud-guidedtour-amazon-google-appnexus- and-gogrid-122 (2008). 21 July 2008
-
(2008)
A Guided Tour of Amazon, Google, AppNexus, and GoGrid, InfoWorld
-
-
Wayner, P.1
-
53
-
-
84891413297
-
Design considerations for S+S and cloud computing, MSDN architecture center
-
Sept
-
Chong, F., Miguel, A., Hogg, J., Homann, U., Zwiefel, B., Garber, D., Joseph, J., Zimmerman, S., Kaufman, S. Design considerations for S+S and Cloud computing, MSDN architecture center. Arch J. Sept 2009. http://msdn. microsoft.com/en-us/architecture/aa699439.aspx
-
(2009)
Arch J
-
-
Chong, F.1
Miguel, A.2
Hogg, J.3
Homann, U.4
Zwiefel, B.5
Garber, D.6
Joseph, J.7
Zimmerman, S.8
Kaufman, S.9
-
54
-
-
84891467168
-
-
WinterGreen Research, Inc., July
-
Worldwide Cloud computing market shares, strategies, and forecasts, 2009-2015, WinterGreen Research, Inc., July 2009, p. 712. http://www. researchandmarkets.com/reports/1057978
-
(2009)
Worldwide Cloud Computing Market Shares, Strategies, and Forecasts, 2009-2015
, pp. 712
-
-
-
62
-
-
84891423252
-
-
20 May 2009
-
U. S. Federal Cloud computing market forecast 2010-2015. Mark Res Media. http://www.marketresearchmedia.com/2009/05/20/us-federal-Cloud-computing-market- forecast-2010-2015/(2009). 20 May 2009
-
(2009)
U. S. Federal Cloud Computing Market Forecast 2010-2015
-
-
-
65
-
-
84891460738
-
-
Aug.
-
NBC's Federal Cloud playbook, NBC. Aug. 2009. http://Cloud.nbc.gov/PDF/ NBC%20Cloud %20White%20Paper%20Final%20 (Web%20Res).pdf
-
(2009)
NBC's Federal Cloud Playbook, NBC
-
-
-
66
-
-
84891446943
-
-
http://ornot.files.wordpress.com/2009/08/Cloud-computing-paradigm-chart1. jpg
-
-
-
-
76
-
-
84891446617
-
-
http://www.disa.mil/nces/product-lines/gcds.html
-
-
-
-
77
-
-
84891378454
-
-
http://www.disa.mil/nces/product-lines/content-discovery.html
-
-
-
-
78
-
-
84891457980
-
-
www.disa.mil/nces/product-lines/gcds.html
-
-
-
-
79
-
-
84891468233
-
-
21 Oct. 2009
-
DoD embraces Cloud computing. http://www.defensemarket.com/?p=67 (2009). 21 Oct. 2009
-
(2009)
DoD Embraces Cloud Computing
-
-
-
83
-
-
84891425342
-
-
Publication Date: 17 March 2009
-
Cloud computing in education, UC Berkely iNews, http://inews.berkeley. edu/articles/Spring2009/Cloud-computing (2009). Publication Date: 17 March 2009
-
(2009)
Cloud Computing in Education, UC Berkely iNews
-
-
-
85
-
-
84891454723
-
-
Cloud book. http://www.Cloudbook.net/ukCloud-gov
-
Cloud Book
-
-
-
87
-
-
84891466646
-
-
Global Government Cloud Computing Roundtable. Cloud Computing and the Canadian Environment. http://www.scribd.com/doc/20818613/Cloud-Computing- and-the-Canadian-Environment
-
Global Government Cloud Computing Roundtable
-
-
-
90
-
-
80051911580
-
The cloudy future of government IT: Cloud computing and the public sector around the world
-
Jan
-
Wyld, D. C.: The Cloudy future of government IT: Cloud computing and the public sector around the world, Int. J. Web Semant. Technol. (IJWesT) 1(1), (Jan 2010)
-
(2010)
Int. J. Web Semant. Technol. (IJWesT)
, vol.1
, Issue.1
-
-
Wyld, D.C.1
-
92
-
-
84891422445
-
-
April
-
Cloud-standards.org. April 2010. http://cloud-standards.org/wiki/index. php?title=Main-Page
-
(2010)
Cloud-standards.org
-
-
-
93
-
-
84891421258
-
-
SaaS.com. http://www.saas.com/inside.jsp?type=solution&samp;page= SolutionsOverview
-
SaaS.com
-
-
-
98
-
-
79960488645
-
-
Types of PaaS Solutions. Salesforce.com. http://www.salesforce.com/paas/ paas-solutions
-
Types of PaaS Solutions
-
-
-
101
-
-
84891393232
-
IaaS-Infrastructure as a service a threat or a weapon?
-
11 Oct. 2007
-
O'Day, P.: IaaS-Infrastructure as a service a threat or a weapon? Cloud Comput. J. http://soa.sys-con.com/node/439721 (2007). 11 Oct. 2007
-
(2007)
Cloud Comput. J.
-
-
O'Day, P.1
-
111
-
-
84891410119
-
-
Open Grid Forum. http://www.ogf.org/(2010)
-
(2010)
-
-
-
112
-
-
84891480422
-
-
Andrieux, A., Czajkowski, K., Dan, A., Keahey, K., Ludwig, H., Nakata, T., Pruyne, J., Rofrano, J., Tuecke, S., Xu, M.: Web Services Agreement Specification (WS-Agreement), Grid Resource Allocation Agreement Protocol (GRAAP) WG. http://www.ogf.org/documents/GFD. 107.pdf
-
Web Services Agreement Specification (WS-Agreement), Grid Resource Allocation Agreement Protocol (GRAAP) WG
-
-
Andrieux, A.1
Czajkowski, K.2
Dan, A.3
Keahey, K.4
Ludwig, H.5
Nakata, T.6
Pruyne, J.7
Rofrano, J.8
Tuecke, S.9
Xu, M.10
-
113
-
-
84891396802
-
-
Andreozzi, S., Burke, S., Ehm, F., Field, L., Galang, G., Konya, B., Litmaath, M., Millar, P., Navarro, J. P.: GLUE Specification v. 2.0, GLUE Working Group. http://www.ogf.org/documents/GFD.147.pdf
-
GLUE Specification V. 2.0, GLUE Working Group
-
-
Andreozzi, S.1
Burke, S.2
Ehm, F.3
Field, L.4
Galang, G.5
Konya, B.6
Litmaath, M.7
Millar, P.8
Navarro, J.P.9
-
115
-
-
84891475247
-
-
Sim, A., Shoshani, A., Badino, P., Barring, O., Baud, J.-P., Corso, E., De Witt, S., Donno, F., Gu, J., Haddox-Schatz, M., Hess, B., Jensen, J., Kowalski, A., Litmaath, M., Magnoni, L., Perelmutov, T., Petravick, D., Watson, C.: The storage resource manager interface specification Version 2.2, Grid Storage Resource Management, http://www.ogf.org/documents/GFD.129.pdf
-
The Storage Resource Manager Interface Specification Version 2.2, Grid Storage Resource Management
-
-
Sim, A.1
Shoshani, A.2
Badino, P.3
Barring, O.4
Baud, J.-P.5
Corso, E.6
De Witt, S.7
Donno, F.8
Gu, J.9
Haddox-Schatz, M.10
Hess, B.11
Jensen, J.12
Kowalski, A.13
Litmaath, M.14
Magnoni, L.15
Perelmutov, T.16
Petravick, D.17
Watson, C.18
-
116
-
-
84891431154
-
-
Antonioletti, M., Drescher, M., Luniewski, A., Newhouse, S., Madduri, R.: OGSA-DMI Functional Specification 1.0, GWD-R-P.134. http://www.ogf.org/ documents/GFD.134.pdf
-
OGSA-DMI Functional Specification 1.0, GWD-R-P.134
-
-
Antonioletti, M.1
Drescher, M.2
Luniewski, A.3
Newhouse, S.4
Madduri, R.5
-
119
-
-
84891418950
-
-
Anjomshoaa, A., Brisard, F., Drescher, M., Fellows, D., Ly, A., McGough, S., Pulsipher, D., Savva, A.: Job Submission Description Language (JSDL) Specification, Version 1.0, Job Submission Description Language (JSDL) Specification. http://www.ogf.org/documents/GFD.136.pdf
-
Job Submission Description Language (JSDL) Specification, Version 1.0, Job Submission Description Language (JSDL) Specification
-
-
Anjomshoaa, A.1
Brisard, F.2
Drescher, M.3
Fellows, D.4
Ly, A.5
McGough, S.6
Pulsipher, D.7
Savva, A.8
-
120
-
-
70350337058
-
-
Foster, I., Grimshaw, A., Lane, P., Lee, W., Morgan, M., Newhouse, S., Pickles, S., Pulsipher, D., Smith, C., Theimer, M.: OGSA Basic Execution Service Version 1.0, GFD-R.108. http://www.ogf.org/documents/GFD.108.pdf
-
OGSA Basic Execution Service Version 1.0, GFD-R.108
-
-
Foster, I.1
Grimshaw, A.2
Lane, P.3
Lee, W.4
Morgan, M.5
Newhouse, S.6
Pickles, S.7
Pulsipher, D.8
Smith, C.9
Theimer, M.10
-
121
-
-
63349106682
-
-
Mach, R., Lepro-Metz, R., Jackson, S.: Usage record-format recommendation, GFD-R-P.098. http://www.ogf.org/documents/GFD.98.pdf
-
Usage Record-format Recommendation, GFD-R-P.098
-
-
Mach, R.1
Lepro-Metz, R.2
Jackson, S.3
-
122
-
-
84891381273
-
-
World Wide Web Consortium (W3C). HTTP Specifications and Drafts. http://www.w3.org/Protocols/Specs.html (2002)
-
(2002)
HTTP Specifications and Drafts
-
-
-
123
-
-
84891374517
-
-
XML, Wikipedia. http://en. wikipedia.org/wiki/XML (2010)
-
(2010)
-
-
-
124
-
-
84891453130
-
-
JavaScript Object Notation. http://www.json.org/xml.html
-
-
-
-
125
-
-
84891383076
-
-
http://www.ajax.org/#home
-
-
-
-
126
-
-
84891394752
-
-
HTML5, Wikipedia. http://en. wikipedia.org/wiki/HTML5 (2010)
-
(2010)
-
-
-
127
-
-
84891464987
-
-
Web syndication, Wikipedia. http://en. wikipedia.org/wiki/Web-syndication (2010)
-
(2010)
-
-
-
129
-
-
84891374211
-
-
Extensible Messaging and Presence Protocol (XMPP), XMPP Standards Foundation. http://xmpp.org/about/(2004)
-
(2004)
-
-
-
132
-
-
84891429510
-
-
OpenID, Wikipedia. http://en. wikipedia.org/wiki/OpenID (2010)
-
(2010)
-
-
-
133
-
-
84891374240
-
-
28 Mar. 2003
-
What is TLS/SSL? Microsoft TechNet. http://technet.microsoft.com/en-us/ library/cc784450 (WS.10).aspx (2003). 28 Mar. 2003
-
(2003)
What Is TLS/SSL? Microsoft TechNet
-
-
-
139
-
-
84891423387
-
-
MWD Advisors. 2009-2010
-
The seven elements of Cloud Computing values. MWD Advisors. 2009-2010. http://itredux.com/wp-content/uploads/2009/10/Cloud-Computing-Values.png
-
The Seven Elements of Cloud Computing Values
-
-
-
155
-
-
70350405850
-
-
University of Melbourne, Manjrasoft Pty Ltd
-
Buyya, R., Yeo, C. S., Venugopal, S.: Market-oriented Cloud Computing: vision, hype, and reality for delivering IT services as computing utilities. The University of Melbourne, Manjrasoft Pty Ltd. http://www.buyya.com/papers/ hpcc2008-keynote-Cloudcomputing.pdf
-
Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
157
-
-
78049416058
-
-
Info World, July
-
Gartner, J. B.: Seven Cloud-Computing security risks. Info World. July 2008. http://www.infoworld.com/d/security-central/gartner-seven-Cloud-computing- security-risks-853?page=0, 0
-
(2008)
Seven Cloud-computing Security Risks
-
-
Gartner, J.B.1
-
158
-
-
84891445148
-
-
Information Management, Nov
-
Scofield, M.: Issues of data ownership. Information Management. Nov. 1998. http://www.information-management.com/issues/19981101/296-1.html
-
(1998)
Issues of Data Ownership
-
-
Scofield, M.1
-
161
-
-
38149009494
-
-
School of Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA
-
Sweeney, L.: k-anonymity: a model for protecting privacy. School of Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA. http://privacy.cs.cmu.edu/people/sweeney/kanonymity.pdf
-
K-anonymity: A Model for Protecting Privacy
-
-
Sweeney, L.1
-
162
-
-
58149089560
-
-
Department of Computer Science, Cornell University
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ȩL-Diversity: privacy beyond k-anonymity. Department of Computer Science, Cornell University. http://www.cs.cornell.edu/~vmuthu/research/ldiversity.pdf
-
ȨL-diversity: Privacy Beyond k-anonymity
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
165
-
-
84879025814
-
-
Jan
-
Data-leak protection. Network World. Jan 2008. http://www.networkworld. com/community/node/23754
-
(2008)
Data-leak Protection
-
-
-
166
-
-
84891453779
-
-
Pune Tech, June
-
Data leakage prevention-overview. Pune Tech. June 2008. http://punetech.com/dataleakage-prevention-overview
-
(2008)
Data Leakage prevention-overview
-
-
-
168
-
-
84891470412
-
-
Blade Network Technologies
-
Dynamic infrastructure: building the Cloud. Blade Network Technologies. http://www.bladenetwork.net/userfiles/image/Dynamic%20Infrastructure%20- %20Building%20the%20Clo ud.png
-
Dynamic Infrastructure: Building the Cloud
-
-
-
171
-
-
77957962695
-
-
Open Cloud Manifesto. Spring. 2009. http://www.scribd.com/doc/19708804/ Open-Cloud-Manifesto
-
(2009)
Open Cloud Manifesto. Spring
-
-
-
180
-
-
84871602696
-
-
Liberty Alliance: http://www.projectliberty.org/liberty/resource-center/ specifications/liberty-alliance-id-wsf-2-0-specifications-including-errata-v1-0- updates
-
Liberty Alliance
-
-
-
181
-
-
67549113863
-
-
May
-
Goodner, M., Hondo, M., Nadalin, A., McIntosh, M., Schmidt, D.: Understanding WS-Federation. May 2007. http://download.boulder.ibm.com/ibmdl/ pub/software/dw/specs/ws-fed/WS-FederationSpec05282007.pdf?S-TACT= 105AGX04&S-CMP=LP
-
(2007)
Understanding WS-federation
-
-
Goodner, M.1
Hondo, M.2
Nadalin, A.3
McIntosh, M.4
Schmidt, D.5
-
182
-
-
78650748757
-
-
Version 0.8. VMware Inc
-
vCloud API programming guide, Version 0.8. VMware Inc. 2009. http://www.vmware.com
-
(2009)
VCloud API Programming Guide
-
-
-
188
-
-
84891470729
-
-
Network World, 2 March 2009
-
Kobielus, J.: Storm Clouds Ahead: SOA governance clashes with cloud computing model. Network World. http://www.networkworld.com/news/2009/030209- soa-cloud.html?page=5 (2009). 2 March 2009
-
(2009)
Storm Clouds Ahead
-
-
Kobielus, J.1
-
191
-
-
79955688700
-
-
White paper, Knoesis Center, Wright State University, Sept
-
Patel, P., Ranabahu, A., Sheth, A.: Service level agreement in cloud computing. White paper, Knoesis Center, Wright State University. Sept 2009. http://knoesis.wright.edu/library/resource.php?id=742
-
(2009)
Service Level Agreement in Cloud Computing
-
-
Patel, P.1
Ranabahu, A.2
Sheth, A.3
-
192
-
-
0347621639
-
The WSLA framework: Specifying and monitoring service level agreements for web services
-
March
-
Keller, A., Ludwig, H.: The WSLA framework: specifying and monitoring service level agreements for web services. J. Netw. Sys. Manag. 11(1), 57-81 (March 2003)
-
(2003)
J. Netw. Sys. Manag
, vol.11
, Issue.1
, pp. 57-81
-
-
Keller, A.1
Ludwig, H.2
-
193
-
-
0347728469
-
-
Ludwig, H., Keller, A., Dan, D., King, R. P., Franck, R.: Web Service Level Agreement (WSLA) language specification, Version 1.0. 2003. http://www.research.ibm.com/wsla/WSLASpecV1-20030128.pdf
-
(2003)
Web Service Level Agreement (WSLA) Language Specification, Version 1.0
-
-
Ludwig, H.1
Keller, A.2
Dan, D.3
King, R.P.4
Franck, R.5
-
195
-
-
84891441469
-
Private cloud computing for enterprises: Meet the demands of high utilization and rapid change
-
Private Cloud Computing for enterprises: meet the demands of high utilization and rapid change. Cisco Systems. http://www.cisco.com/en/US/ solutions/collateral/ns340/ns517/ns224/ns836/ns976/white-paper-c11-543729.html
-
Cisco Systems
-
-
-
202
-
-
3142715261
-
-
Morgan Kaufman Publishing, San Francisco, ISBN: 1-55860-859-1
-
Strassner, J.: Policy Based Network Management. Morgan Kaufman Publishing, San Francisco (2003). ISBN: 1-55860-859-1
-
(2003)
Policy Based Network Management
-
-
Strassner, J.1
-
205
-
-
0013089972
-
-
Internet Draft. draft-ietf-policy-qos-info-model-03.txt, April
-
Snir, Y., Ramberg, Y., Strassner, J., Cohen, R.: Policy framework QoS information model. Internet Draft. draft-ietf-policy-qos-info-model-03.txt. April 2001
-
(2001)
Policy Framework QoS Information Model
-
-
Snir, Y.1
Ramberg, Y.2
Strassner, J.3
Cohen, R.4
-
206
-
-
0004144799
-
-
Feb.
-
Moore, B., Ellesson, E., Strassner, J., Westerinen, A.: Policy core information model-version 1 specification, RFC 3060. Feb. 2001
-
(2001)
Policy Core Information Model-version 1 Specification, RFC 3060
-
-
Moore, B.1
Ellesson, E.2
Strassner, J.3
Westerinen, A.4
-
207
-
-
0004145587
-
-
Chapter 10, Macmillan Technical Publishing, Indianapolis
-
Strassner, J.: Directory Enabled Networks, tChapter 10. Macmillan Technical Publishing, Indianapolis (1999)
-
(1999)
Directory Enabled Networks
-
-
Strassner, J.1
-
216
-
-
62349141135
-
-
MILCOM, San Diego
-
Kumar, N., Kumar, P., Jiang, X., Kowtha, S., Chow, E., Chang, H. P., James, M., Freides, D., MacArthur, G., Mayer, A.: Applying policy based enterprise management towards realization of disn real-time services. MILCOM, San Diego (2008)
-
(2008)
Applying Policy Based Enterprise Management Towards Realization of Disn Real-time Services
-
-
Kumar, N.1
Kumar, P.2
Jiang, X.3
Kowtha, S.4
Chow, E.5
Chang, H.P.6
James, M.7
Freides, D.8
MacArthur, G.9
Mayer, A.10
-
222
-
-
33847155027
-
-
Business-Driven IT Management BDIM, IEEE Communications Society, Vancouver
-
Aib, I., Sallé, M., Bartolini, C., Boulmakoul, A., Boutaba, R., Pujolle, G.: Business aware policy based management. Business-Driven IT Management (BDIM), IEEE Communications Society, Vancouver (2006)
-
(2006)
Business Aware Policy Based Management
-
-
Aib, I.1
Sallé, M.2
Bartolini, C.3
Boulmakoul, A.4
Boutaba, R.5
Pujolle, G.6
-
223
-
-
84891395133
-
-
Aeronautical Telecommunication Network ATN Seminar, International Civil Aviation Organization and Aeronautical Radio of Thailand Limited, Thailand, 11-14 Dec
-
Mai, C.: Policy based management system. Aeronautical Telecommunication Network (ATN) Seminar, International Civil Aviation Organization and Aeronautical Radio of Thailand Limited, Thailand, 11-14 Dec. 2001
-
(2001)
Policy Based Management System
-
-
Mai, C.1
-
226
-
-
0027969913
-
The complexity and computability of secure interoperation
-
Gong, L., Qian, X.: The complexity and computability of secure interoperation. Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington (1994), pp. 190-200
-
(1994)
Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington
, pp. 190-200
-
-
Gong, L.1
Qian, X.2
-
227
-
-
33750907119
-
Methods and limitations of security policy reconciliation
-
McDaniel, P., Prakash, A.: Methods and limitations of security policy reconciliation. ACM Trans. Info. Sys. Secur. 9(3), 259-291 (2006)
-
(2006)
ACM Trans. Info. Sys. Secur
, vol.9
, Issue.3
, pp. 259-291
-
-
McDaniel, P.1
Prakash, A.2
-
228
-
-
34547271784
-
Defeasible security policy composition for web services
-
Lee, A., Boyer, J., Olson, L., Gunter, C.: Defeasible security policy composition for web services. Proceedings of the 4th ACM workshop on Formal Methods in Security, ACM, New York (2006), pp. 45-54
-
(2006)
Proceedings of the 4th ACM Workshop on Formal Methods in Security, ACM, New York
, pp. 45-54
-
-
Lee, A.1
Boyer, J.2
Olson, L.3
Gunter, C.4
-
229
-
-
39749167739
-
Enabling web services policy negotiation with privacy preserved using XACML
-
Cheng, V., Hung, P., Chiu, D.: Enabling web services policy negotiation with privacy preserved using XACML. Proceedings of the 40th Hawaii International Conference on System Sciences, IEEE Computer Society, Washington (2007)
-
(2007)
Proceedings of the 40th Hawaii International Conference on System Sciences, IEEE Computer Society, Washington
-
-
Hung, P.1
Chiu, D.2
-
230
-
-
67449088202
-
Context-aware trust negotiation in peer-to-peer service collaborations
-
March
-
Li, J., Zhang, D., Huai, J., Xu, J.: Context-aware trust negotiation in peer-to-peer service collaborations. Peer-to-Peer Netw. Appl. 2(2), 164-177 (March 2009)
-
(2009)
Peer-to-Peer Netw. Appl.
, vol.2
, Issue.2
, pp. 164-177
-
-
Li, J.1
Zhang, D.2
Huai, J.3
Xu, J.4
-
231
-
-
84891469772
-
-
NASA Jet Propulsion Laboratory California Institute of Technology, California
-
Chow, E., James, M., Chang, H.-P., Vatan, F., Sudhir, G.: An Intelligent network for federated testing of NetCentric systems. NASA Jet Propulsion Laboratory California Institute of Technology, California
-
An Intelligent Network for Federated Testing of NetCentric Systems
-
-
Chow, E.1
James, M.2
Chang, H.-P.3
Vatan, F.4
Sudhir, G.5
-
232
-
-
0347720836
-
An adaptive policy-based framework for network services management
-
Sept
-
Lymberopoulos, L., Lupu, E., Sloman, M.: An adaptive policy-based framework for network services management. J. Netw. Sys. Manag. 11(3), 277-303 (Sept 2003)
-
(2003)
J. Netw. Sys. Manag
, vol.11
, Issue.3
, pp. 277-303
-
-
Lymberopoulos, L.1
Lupu, E.2
Sloman, M.3
-
234
-
-
84891381070
-
-
Open Group:, The Open Group, Berkshire, Oct
-
The Open Group: SLA Management Handbook, vol. 4. The Open Group, Berkshire (Oct. 2004)
-
(2004)
SLA Management Handbook, Vol
, vol.4
-
-
-
239
-
-
70350432558
-
Manageability and operability in the business services fabric
-
29 June-1 July
-
Goyal, P., Mikkilineni, R., Ganti, M.: Manageability and operability in the business services fabric. Proceedings of 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2009, Groningen, 29 June-1 July 2009
-
(2009)
Proceedings of 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2009, Groningen
-
-
Goyal, P.1
Mikkilineni, R.2
Ganti, M.3
-
240
-
-
70350397291
-
FCAPS in the business services fabric model
-
29 June-1 July
-
Goyal, P., Mikkilineni, R.: FCAPS in the business services fabric model. Proceedings of 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2009, Groningen, 29 June-1 July 2009
-
(2009)
Proceedings of 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2009, Groningen
-
-
Goyal, P.1
Mikkilineni, R.2
-
244
-
-
0030086382
-
Role-based access control models
-
Feb
-
Sandhu, R. S., Coynek, E. J., Feinsteink, H. L., Youmank, C. E.: Role-based access control models. IEEE Comput. 29(2), 38-47 (Feb. 1996)
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coynek, E.J.2
Feinsteink, H.L.3
Youmank, C.E.4
-
245
-
-
33748081445
-
TrustBAC-integrating trust relationships into the RBAC model for access control in open systems
-
ACM, Lake Tahoe, 7-9 June
-
Chakraborty, S., Ray, I.: TrustBAC-integrating trust relationships into the RBAC model for access control in open systems. Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), ACM, Lake Tahoe, 7-9 June 2006
-
(2006)
Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Chakraborty, S.1
Ray, I.2
-
246
-
-
0037362986
-
Role-based access control with X.509 attribute certificates
-
March/April
-
Otenko, D. C. A., Ball, E.: Role-based access control with X.509 attribute certificates. IEEE Internet Comput. 7(2), 62-69 (March/April 2003)
-
(2003)
IEEE Internet Comput.
, vol.7
, Issue.2
, pp. 62-69
-
-
Otenko, D.C.A.1
Ball, E.2
-
247
-
-
84891405806
-
-
Forschungsgruppe Institut für Telematik, Universität Trier, 54286, Trier n. d.
-
Zhou, W., Meinel, C.: Implement Role-Based Access Control with Attribute Certificates. Forschungsgruppe Institut für Telematik, Universität Trier, 54286, Trier (n. d.)
-
Implement Role-based Access Control with Attribute Certificates
-
-
Zhou, W.1
Meinel, C.2
-
248
-
-
84891447522
-
-
and http://www.hl7.org/v3bal lot/html/infrastructure/vocabulary/voca bulary.htm, Version 1058-20100815, 22 Aug
-
Health Level Seven International, HL7 Vocabulary, http://www.hl7.org/and http://www.hl7.org/v3ballot/html/infrastructure/vocabulary/vocabulary.htm, Version 1058-20100815, 22 Aug. 2010
-
(2010)
-
-
-
250
-
-
0004216472
-
Network security
-
Prentice Hall, Upper Saddle River
-
Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication a Public World. Prentice Hall, Upper Saddle River (2002)
-
(2002)
Private Communication a Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
251
-
-
34047204338
-
RBAC on the Web using LDAP
-
IFIP, Ontario, 15-18 July
-
Park, J. S., Ahn, G.-J., Sandhu, R.: RBAC on the Web using LDAP. Proceedings of the 15th IFIP WG 11.3 Working Conference on Database and Application Security, IFIP, Ontario, 15-18 July 2001
-
(2001)
Proceedings of the 15th IFIP WG 11.3 Working Conference on Database and Application Security
-
-
Park, J.S.1
Ahn, G.-J.2
Sandhu, R.3
-
252
-
-
84891467285
-
-
Cisco Systems, Public Export Product Data, http://tools.cisco.com/legal/ export/pepd/Search.do, 2006
-
(2006)
Public Export Product Data
-
-
-
255
-
-
84891419289
-
-
Microsoft Developer Network page about CSPs. http://msdn. microsoft.com/en-us/library/aa380245 (VS.85).aspx
-
-
-
-
256
-
-
0003899818
-
The Kerberos network authentication service (V5)
-
July
-
Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos network authentication service (V5). Internet Engineering Task Force Request for Comments (IETF RFC) 4120. July 2005
-
(2005)
Internet Engineering Task Force Request for Comments (IETF RFC) 4120
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
257
-
-
84891394140
-
Role-Based access control for the web
-
Barkley, J. F., Kuhn, D. R., Rosenthal, L. S., Skall, M. W., Cincotta, A. V.: Role-Based access control for the web. National Institute of Standards and Technology. http://csrc.nist.gov/rbac/cals-paper.html
-
National Institute of Standards and Technology.
-
-
Barkley, J.F.1
Kuhn, D.R.2
Rosenthal, L.S.3
Skall, M.W.4
Cincotta, A.V.5
-
258
-
-
84871234823
-
Federated identity architectures
-
IEEE Computer Society, Oaxaca, Nov
-
Fragoso-Rodriguez, U., Laurent-Maknaviciu, M., Incera-Dieguez, J.: Federated identity architectures. 1st Mexican Conference on Informatics Security 2006 (MCIS 2006), IEEE Computer Society, Oaxaca, Nov. 2006
-
(2006)
1st Mexican Conference on Informatics Security 2006 (MCIS 2006)
-
-
Fragoso-Rodriguez, U.1
Laurent-Maknaviciu, M.2
Incera-Dieguez, J.3
-
259
-
-
84891420343
-
-
Liberty Alliance. http://www.projectliberty.org/liberty/resource-center/ specifications/liberty-alliance-id-wsf-2-0-specifications-including-errata-v1-0- updates
-
-
-
-
260
-
-
67549113863
-
-
Goodner, M., Hondo, M., Nadalin, A., McIntosh, M., Schmidt, D.: Understanding WS-Federation. May 2007. http://download.boulder.ibm.com/ibmdl/ pub/software/dw/specs/ws-fed/WS-FederationSpec05282007.pdf?S-TACT = 105AGX04&S-CMP=LP
-
(2007)
Understanding WS-federation. May
-
-
Goodner, M.1
Hondo, M.2
Nadalin, A.3
McIntosh, M.4
Schmidt, D.5
-
261
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute Clouds
-
ACM, Chicago, 9-13 Nov
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute Clouds. Proceedings of 16th ACM Conference on Computer and Communications Security, ACM, Chicago, 9-13 Nov. 2009
-
(2009)
Proceedings of 16th ACM Conference on Computer and Communications Security
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
262
-
-
84891402602
-
-
Side channel attack. Wikipedia. http://en. wikipedia.org/wiki/Side- channel-attack
-
-
-
-
263
-
-
70449657350
-
Non-interference for a practical DIFC-based operating system
-
Oakland, 17-20 May
-
Krohn, M., Tromer, E.: Non-interference for a practical DIFC-based operating system. Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, IEEE, Oakland, 17-20 May 2009
-
(2009)
Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, IEEE
-
-
Krohn, M.1
Tromer, E.2
-
264
-
-
52649128991
-
Memory performance attacks: Denial of memory service in multicore systems
-
USENIX, Boston, 6-10, Aug
-
Moscibroda, T., Mutlu, O.: Memory performance attacks: denial of memory service in multicore systems. Proceedings of 16th USENIX Security Symposium, USENIX, Boston, 6-10, Aug. 2007
-
(2007)
Proceedings of 16th USENIX Security Symposium
-
-
Moscibroda, T.1
Mutlu, O.2
-
265
-
-
85084161110
-
Timing analysis of keystrokes and SSH timing attacks
-
USENIX, Washington, 13-17 Aug
-
Song, D. X., Wagner, D., Tian, X.: Timing analysis of keystrokes and SSH timing attacks. Proceedings of 10th USENIX Security Symposium, USENIX, Washington, 13-17 Aug. 2001
-
(2001)
Proceedings of 10th USENIX Security Symposium
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
267
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasures
-
Tromer, E., Osvik, D. A., Shamir, A.: Efficient cache attacks on AES, and countermeasures. J. Cryptol. 23(1), 37-71 (2010)
-
(2010)
J. Cryptol.
, vol.23
, Issue.1
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
268
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
Fort Washington
-
Anderson, J. P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington (1980)
-
(1980)
James P. Anderson Co.
-
-
Anderson, J.P.1
-
270
-
-
0023294428
-
An intrusion-detection model
-
Denning, D. E.: An intrusion-detection model. IEEE Trans. Software Eng. 13(2), 222-232 (1987)
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
271
-
-
35048833049
-
A generic architecture for fusion-based intrusion detection systems
-
Erasmus University Rotterdam Oct
-
De Boer, R. C.: A generic architecture for fusion-based intrusion detection systems. Master Thesis, Erasmus University Rotterdam (Oct. 2002)
-
(2002)
Master Thesis
-
-
De Boer, R.C.1
-
272
-
-
84891427442
-
GridSec: Trusted Grid Computing with security binding and self-defense against network worms and DDoS attacks
-
Emory University, Atlanta, 22-25 May
-
Hwang, K., Kwok, Y.-K., Song, S., Chen, M. C. Y., Chen, Y., Zhou, R., Lou, X.: GridSec: trusted Grid Computing with security binding and self-defense against network worms and DDoS attacks. International Workshop on Grid Computing Security and Resource Management (GSRM'05), in conjunction with the International Conference on Computational Science (ICCS 2005), Emory University, Atlanta, 22-25 May 2005
-
(2005)
International Workshop on Grid Computing Security and Resource Management (GSRM'05), in conjunction with the International Conference on Computational Science (ICCS 2005)
-
-
Hwang, K.1
Kwok, Y.-K.2
Song, S.3
Chen, M.C.Y.4
Chen, Y.5
Zhou, R.6
Lou, X.7
-
273
-
-
20844436808
-
Collaborative internet worm containment
-
Cai, M., Hwang, K., Kwok, Y.-K., Chen, Y., Song, S.: Collaborative internet worm containment. IEEE Secur. Priv. 3(3), 25-33 (2005)
-
(2005)
IEEE Secur. Priv.
, vol.3
, Issue.3
, pp. 25-33
-
-
Cai, M.1
Hwang, K.2
Kwok, Y.-K.3
Chen, Y.4
Song, S.5
-
274
-
-
25144504707
-
Protecting network-centric computing system from intrusive and anomalous attacks
-
in conjunction with IEEE/ACM IPDPS, Denver, IEEE/ACM, 8 April
-
Hwang, K., Chen, Y., Liu, H.: Protecting network-centric computing system from intrusive and anomalous attacks. Proceedings of 1st IEEE International Workshop on Security in Systems and Networks (SSN'05), in conjunction with IEEE/ACM IPDPS, Denver, IEEE/ACM, 8 April 2005
-
(2005)
Proceedings of 1st IEEE International Workshop on Security in Systems and Networks (SSN'05)
-
-
Hwang, K.1
Chen, Y.2
Liu, H.3
-
275
-
-
25144512799
-
Inferring network anomalies from mices: A low-complexity traffic monitoring approach
-
Philadelphia, Pennsylvania, 26 Aug
-
Cai, M., Kwok, Y.-K., Hwang, K.: Inferring network anomalies from mices: a low-complexity traffic monitoring approach. ACM SIGCOMM Workshop on Mining Network Data, Philadelphia, Pennsylvania, 26 Aug. 2005
-
(2005)
ACM SIGCOMM Workshop on Mining Network Data
-
-
Cai, M.1
Kwok, Y.-K.2
Hwang, K.3
-
276
-
-
84891388496
-
-
RESTful Web services: the basics, Nov
-
RESTful Web services: the basics. IBM. Nov. 2008. http://www.ibm.com/ developerworks/webservices/library/ws-restful
-
(2008)
-
-
-
277
-
-
84891377543
-
-
Simple Object Access Protocol (SOAP). W3C, http://www.w3.org/TR/soap
-
-
-
-
278
-
-
84891404019
-
-
March
-
Top threats to Cloud Computing V1.0. Cloud Security Alliance. March 2010. http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
-
(2010)
-
-
-
279
-
-
84891392384
-
Solaris security for developers guide
-
Nov.
-
Solaris security for developers guide. Sun Microsystems. Nov. 2009
-
(2009)
Sun Microsystems
-
-
-
280
-
-
84891380275
-
Toward systemically secure IT architectures
-
Feb.
-
Toward systemically secure IT architectures. Sun Microsystems. Feb. 2006
-
(2006)
Sun Microsystems
-
-
-
281
-
-
84891432648
-
-
Immutable service containers
-
Immutable service containers. Open Solaris. 2010. http://hub.opensolaris. org/bin/view/Project+isc/Architecture
-
(2010)
-
-
-
283
-
-
84891433753
-
-
The Trusted Computing Group. https://www.trustedcomputinggroup.org
-
-
-
-
284
-
-
4944258908
-
Distributed file system support for virtual machines in grid computing
-
IEEE, Honolulu, 4-6 June
-
Zhao, M., Zhang, J., Figueiredo, R.: Distributed file system support for virtual machines in Grid Computing. Proceedings of the 13th IEEE International Symposium on high performance distributed computing, IEEE, Honolulu, 4-6 June 2004
-
(2004)
Proceedings of the 13th IEEE International Symposium on High Performance Distributed Computing
-
-
Zhao, M.1
Zhang, J.2
Figueiredo, R.3
-
285
-
-
84891378537
-
-
Hadoop Distributed File System (HDFS). Apache. http://hadoop. apache.org/common/docs/current/hdfs-design.html
-
-
-
-
286
-
-
0042352260
-
Separating key management from file system security
-
Dec
-
Mazières, D., Kaminsky, M., Kaashoek, M. F., Witchel, E.: Separating key management from file system security. Operat. Sys. Rev. 34(5), 124-139 (Dec. 1999)
-
(1999)
Operat. Sys. Rev.
, vol.34
, Issue.5
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
287
-
-
74049145625
-
Managing security of virtual machine images in a Cloud environment
-
ACM, Chicago, 13 Nov
-
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a Cloud environment. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, ACM, Chicago, 13 Nov. 2009
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
290
-
-
84891442724
-
The future of cloud computing
-
18 Jan
-
Geelan, J.: The future of Cloud Computing. Cloud Comput. J. (18 Jan 2009). http://Cloudcomputing.sys-con.com/node/771947
-
(2009)
Cloud Comput. J
-
-
Geelan, J.1
-
293
-
-
84891415843
-
Cloud computing's future depends on securing it, industry execs say
-
02 March 2010
-
Jackson, W.: Cloud computing's future depends on securing it, industry execs say. Government Computer News (GCN). http://gcn.com/Articles/2010/03/02/ RSA-Cloud-Keynotes.aspx (2010). 02 March 2010
-
(2010)
Government Computer News (GCN)
-
-
Jackson, W.1
|