-
1
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
EECS Department, U.C. Berkeley February
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the clouds: A berkeley view of cloud computing, in Tech. Rep. UCB/EECS-2009-28, EECS Department, U.C. Berkeley, February 2009.
-
(2009)
Tech. Rep. UCB/EECS-2009-28
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
December
-
L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, A break in the clouds: towards a cloud definition, ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, December 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.39
, pp. 50-55
-
-
Vaquero, L.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
4
-
-
0003696305
-
-
ser. International Series in Software Engineering Springer, Heidelberg
-
L. Chung, B. Nixon, E. Yu, and J. Mylopoulos, Non-Functional Requirements in Software Engineering, ser. International Series in Software Engineering, Vol. 5. Springer, Heidelberg, 1999.
-
(1999)
Non-Functional Requirements in Software Engineering
, vol.5
-
-
Chung, L.1
Nixon, B.2
Yu, E.3
Mylopoulos, J.4
-
5
-
-
79956020537
-
Non-functional property based service selection: A survey and classification of approaches
-
Dublin, Ireland, November 2008
-
H. Yu and S. Reiff-Marganiec, Non-functional property based service selection: A survey and classification of approaches, in Proc. of NFPSLAM-SOC 2008, Dublin, Ireland, November 2008.
-
Proc. of NFPSLAM-SOC 2008
-
-
Yu, H.1
Reiff-Marganiec, S.2
-
6
-
-
84893514178
-
An approach to measure security of cloud hosted application
-
Bangalore, India, October
-
N. Chauhan, A. Saxena, and J. Murthy, An approach to measure security of cloud hosted application, in Proc. of IEEE CCEM 2013, Bangalore, India, October 2013.
-
(2013)
Proc. of IEEE CCEM 2013
-
-
Chauhan, N.1
Saxena, A.2
Murthy, J.3
-
7
-
-
84879167714
-
The three pillars of a secure hybrid cloud environment
-
C. Jenkins, The three pillars of a secure hybrid cloud environment, Computer Fraud &Security, vol. 2013, no. 6, pp. 13-15, 2013.
-
(2013)
Computer Fraud &Security
, vol.2013
, Issue.6
, pp. 13-15
-
-
Jenkins, C.1
-
9
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
Vancouver, Canada, July-August 2006
-
S. Berger, R. Caceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, vTPM: Virtualizing the trusted platform module, in Proc. of USENIX-SS 2006, Vancouver, Canada, July-August 2006.
-
Proc. of USENIX-SS 2006
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
10
-
-
84864231037
-
An adaptive hybrid elasticity controller for cloud infrastructures
-
Maui, HI, USA, April 2012
-
A. Ali-Eldin, J. Tordsson, and E. Elmroth, An adaptive hybrid elasticity controller for cloud infrastructures, in Proc. of IEEE NOMS 2012, Maui, HI, USA, April 2012.
-
Proc. of IEEE NOMS 2012
-
-
Ali-Eldin, A.1
Tordsson, J.2
Elmroth, E.3
-
11
-
-
77954889082
-
Benchmarking cloud serving systems with ycsb
-
Indianapolis, IN, USA, March 2010
-
B. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears, Benchmarking cloud serving systems with ycsb, in Proc. of ACM SoCC 2010, Indianapolis, IN, USA, March 2010.
-
(2010)
Proc. of ACM SoCC
-
-
Cooper, B.1
Silberstein, A.2
Tam, E.3
Ramakrishnan, R.4
Sears, R.5
-
12
-
-
85027938495
-
Performance analysis of cloud computing services for many-tasks scientific computing
-
June
-
A. Iosup, S. Ostermann, N. Yigitbasi, R. Prodan, T. Fahringer, and D. Epema, Performance analysis of cloud computing services for many-tasks scientific computing, IEEE TDPS, vol. 22, pp. 931-945, June 2011.
-
(2011)
IEEE TDPS
, vol.22
, pp. 931-945
-
-
Iosup, A.1
Ostermann, S.2
Yigitbasi, N.3
Prodan, R.4
Fahringer, T.5
Epema, D.6
-
13
-
-
79551491370
-
Dynamically scaling applications in the cloud
-
January
-
L. M. Vaquero, L. Rodero-Merino, and R. Buyya, Dynamically scaling applications in the cloud, CCR, vol. 41, no. 1, pp. 45-52, January 2011.
-
(2011)
CCR
, vol.41
, Issue.1
, pp. 45-52
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Buyya, R.3
-
14
-
-
84926426274
-
An agent based business aware incident detection system for cloud environments
-
F. Doelitzscher, C. Reich, M. Knahl, A. Passfall, and N. Clarke, An agent based business aware incident detection system for cloud environments, Journal of Cloud Computing, vol. 1, no. 1, pp. 1-19, 2012.
-
(2012)
Journal of Cloud Computing
, vol.1
, Issue.1
, pp. 1-19
-
-
Doelitzscher, F.1
Reich, C.2
Knahl, M.3
Passfall, A.4
Clarke, N.5
-
15
-
-
84899708756
-
Sun behind clouds-On automatic cloud security audits and a cloud audit policy language
-
F. Doelitzscher, T. Ruebsamen, T. Karbe, M. Knahl, C. Reich, and N. Clarke, Sun behind clouds-on automatic cloud security audits and a cloud audit policy language, International Journal on Advances in Networks and Services, vol. 6, no. 1-2, pp. 1-16, 2013.
-
(2013)
International Journal on Advances in Networks and Services
, vol.6
, Issue.1-2
, pp. 1-16
-
-
Doelitzscher, F.1
Ruebsamen, T.2
Karbe, T.3
Knahl, M.4
Reich, C.5
Clarke, N.6
-
16
-
-
84897761405
-
Security issues in cloud environments: A survey
-
September
-
D. Fernandes, L. Soares, J. Gomes, M. Freire, and P. Inacio, Security issues in cloud environments: a survey, International Journal of Information Security, pp. 1-58, September 2013.
-
(2013)
International Journal of Information Security
, pp. 1-58
-
-
Fernandes, D.1
Soares, L.2
Gomes, J.3
Freire, M.4
Inacio, P.5
-
17
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
Chicago, IL, USA, October
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, All your clouds are belong to us: Security analysis of cloud management interfaces, in Proc. of ACM CCSW 2011, Chicago, IL, USA, October 2011.
-
(2011)
Proc. of ACM CCSW 2011
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
18
-
-
74049144464
-
Hail: A high-Availability and integrity layer for cloud storage
-
Chicago, IL, USA, November
-
K. D. Bowers, A. Juels, and A. Oprea, Hail: A high-Availability and integrity layer for cloud storage, in Proc. of ACM CCS 2009, Chicago, IL, USA, November 2009.
-
(2009)
Proc. of ACM CCS 2009
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
19
-
-
84869476900
-
Hourglass schemes: How to prove that cloud files are encrypted
-
Raleigh, NC, USA, October
-
M. van Dijk, A. Juels, A. Oprea, R. L. Rivest, E. Stefanov, and N. Triandopoulos, Hourglass schemes: How to prove that cloud files are encrypted, in Proc. of ACM CCS 2012, Raleigh, NC, USA, October 2012.
-
(2012)
Proc. of ACM CCS 2012
-
-
Van Dijk, M.1
Juels, A.2
Oprea, A.3
Rivest, R.L.4
Stefanov, E.5
Triandopoulos, N.6
-
20
-
-
78650558794
-
Secure virtualization for cloud computing
-
F. Lombardi and R. Di Pietro, Secure virtualization for cloud computing, Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1113-1122, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Di Pietro, R.2
-
21
-
-
84881301985
-
Automated, elastic resource provisioning for nosql clusters using tiramola
-
Delft, The Netherlands, May
-
D. Tsoumakos, I. Konstantinou, C. Boumpouka, S. Sioutas, and N. Koziris, Automated, elastic resource provisioning for nosql clusters using tiramola, in Proc. of ACM CCGrid 2013, Delft, The Netherlands, May 2013.
-
(2013)
Proc. of ACM CCGrid 2013
-
-
Tsoumakos, D.1
Konstantinou, I.2
Boumpouka, C.3
Sioutas, S.4
Koziris, N.5
-
22
-
-
84863167222
-
Cloud testing tools
-
Irvine, CA, USA, December
-
X. Bai, M. Li, B. Chen, W.-T. Tsai, and J. Gao, Cloud testing tools, in Proc of. IEEE SOSE 2011, Irvine, CA, USA, December 2011.
-
(2011)
Proc of IEEE SOSE 2011
-
-
Bai, X.1
Li, M.2
Chen, B.3
Tsai, W.-T.4
Gao, J.5
-
23
-
-
77953793664
-
When to migrate software testing to the cloud
-
Paris, France, April 2010
-
T. Parveen and S. Tilley, When to migrate software testing to the cloud in Proc of ICSTW 2010, Paris, France, April 2010.
-
(2010)
Proc of ICSTW
-
-
Parveen, T.1
Tilley, S.2
-
24
-
-
84857187859
-
Monitoring intrusions and security breaches in highly distributed cloud environments
-
Athens, Greece, November-December
-
A. Monfared and M. Jaatun, Monitoring intrusions and security breaches in highly distributed cloud environments, in Proc. of IEEE CloudCom 2011, Athens, Greece, November-December 2011.
-
(2011)
Proc. of IEEE CloudCom 2011
-
-
Monfared, A.1
Jaatun, M.2
-
25
-
-
77957948402
-
A runtime model based monitoring approach for cloud
-
Miami, FL, USA, July
-
J. Shao, H. Wei, Q. Wang, and H. Mei, A runtime model based monitoring approach for cloud, in Proc. of IEEE CLOUD 2010, Miami, FL, USA, July 2010.
-
(2010)
Proc. of IEEE CLOUD 2010
-
-
Shao, J.1
Wei, H.2
Wang, Q.3
Mei, H.4
-
26
-
-
84888067180
-
Towards the certification of cloud services
-
Santa Clara, CA, USA, June-July
-
S. Cimato, E. Damiani, F. Zavatarelli, and R. Menicocci, Towards the certification of cloud services, in Proc. of IEEE SERVICES 2013, Santa Clara, CA, USA, June-July 2013.
-
(2013)
Proc. of IEEE SERVICES 2013
-
-
Cimato, S.1
Damiani, E.2
Zavatarelli, F.3
Menicocci, R.4
-
27
-
-
84894222450
-
Incremental certification of cloud services
-
Barcelona, Spain, August 2013
-
M. Krotsiani, G. Spanoudakis, and K. Mahbub, Incremental certification of cloud services, in Proc. of SECURWARE 2013, Barcelona, Spain, August 2013.
-
(2013)
Proc. of SECURWARE
-
-
Krotsiani, M.1
Spanoudakis, G.2
Mahbub, K.3
|