-
1
-
-
68249129760
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, Feb 2009
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, Feb 2009.
-
“Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
84861643521
-
Vdn: Virtual machine image distribution network for cloud data centers
-
C. Peng, M. Kim, Z. Zhang, and H. Lei, “Vdn: Virtual machine image distribution network for cloud data centers,” in Proceedings of the INFOCOM, 2012, pp. 181–189.
-
(2012)
Proceedings of the INFOCOM
, pp. 181-189
-
-
Peng, C.1
Kim, M.2
Zhang, Z.3
Lei, H.4
-
3
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1–11, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
4
-
-
84866350168
-
-
CoRR, vol. abs/1109.5388
-
R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal, “A survey on security issues in cloud computing,” CoRR, vol. abs/1109.5388, 2011.
-
(2011)
A survey on security issues in cloud computing
-
-
Bhadauria, R.1
Chaki, R.2
Chaki, N.3
Sanyal, S.4
-
5
-
-
39049125624
-
Controlling ip spoofing through interdomain packet filters
-
Z. Duan, X. Yuan, and J. Chandrashekar, “Controlling ip spoofing through interdomain packet filters,” IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 1, pp. 22–36, 2008.
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.1
, pp. 22-36
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
6
-
-
33947503628
-
Defense against spoofed ip traffic using hop-count filtering
-
H. Wang, C. Jin, and K. G. Shin, “Defense against spoofed ip traffic using hop-count filtering,” IEEE/ACM Transactions on Networking, vol. 15, no. 1, pp. 40–53, 2007.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
7
-
-
33646742035
-
Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, “Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks,” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 2, pp. 141–155, 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
8
-
-
84860543902
-
Discriminating ddos attacks from flash crowds using flow correlation coefficient
-
S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, “Discriminating ddos attacks from flash crowds using flow correlation coefficient,” IEEE Transactions on Parallel Distributed Systems, vol. 23, no. 6, pp. 794–805, 2012.
-
(2012)
IEEE Transactions on Parallel Distributed Systems
, vol.23
, Issue.6
, pp. 794-805
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Guo, S.4
Xiang, Y.5
Tang, F.6
-
10
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
D. K. Y. Yau, J. C. S. Lui, F. Liang, and Y. Yam, “Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles,” IEEE/ACM Transactions on Networking, vol. 13, no. 1, pp. 29–42, 2005.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.1
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yam, Y.4
-
11
-
-
34247601459
-
A divide-and-conquer strategy for thwarting distributed denial-of-service attacks
-
R. Chen, J.-M. Park, and R. Marchany, “A divide-and-conquer strategy for thwarting distributed denial-of-service attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 577–588, 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.5
, pp. 577-588
-
-
Chen, R.1
Park, J.-M.2
Marchany, R.3
-
12
-
-
36348929372
-
Collaborative detection of ddos attacks over multiple network domains
-
Y. Chen, K. Hwang, and W.-S. Ku, “Collaborative detection of ddos attacks over multiple network domains,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649–1662, 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
13
-
-
84860544941
-
Firecol, a collaborative protection network for the detection of flooding ddos attacks
-
J. Francois, I. Aib, and R. Boutaba, “Firecol, a collaborative protection network for the detection of flooding ddos attacks,” IEEE/ACM Transactions on Networking, vol. 20, no. 6, pp. 1828–1841, 2012.
-
(2012)
IEEE/ACM Transactions on Networking
, vol.20
, Issue.6
, pp. 1828-1841
-
-
Francois, J.1
Aib, I.2
Boutaba, R.3
-
14
-
-
84856328279
-
Edos-shield - a two-steps mitigation technique against edos attacks in cloud computing
-
M. H. Sqalli, F. Al-Haidari, and K. Salah, “Edos-shield - a two-steps mitigation technique against edos attacks in cloud computing,” in Proceedings of the UCC, 2011, pp. 49–56.
-
(2011)
Proceedings of the UCC
, pp. 49-56
-
-
Sqalli, M.H.1
Al-Haidari, F.2
Salah, K.3
-
15
-
-
84875706647
-
The insecurity of cloud utility models
-
J. Idziorek, M. Tannian, and D. Jacobson, “The insecurity of cloud utility models,” IT Professional, vol. 15, no. 2, pp. 22–27, 2013.
-
(2013)
IT Professional
, vol.15
, Issue.2
, pp. 22-27
-
-
Idziorek, J.1
Tannian, M.2
Jacobson, D.3
-
16
-
-
70349659341
-
Adaptive early packet filtering for protecting firewalls against dos attacks
-
A. El-Atawy, E. Al-Shaer, T. Tran, and R. Boutaba, “Adaptive early packet filtering for protecting firewalls against dos attacks,” in Proceedings of the INFOCOM, 2009.
-
(2009)
Proceedings of the INFOCOM
-
-
El-Atawy, A.1
Al-Shaer, E.2
Tran, T.3
Boutaba, R.4
-
17
-
-
79960631828
-
Mitigating ddos attacks with transparent and intelligent fast-flux swarm network
-
R. Lua and K. C. Yow, “Mitigating ddos attacks with transparent and intelligent fast-flux swarm network,” IEEE Network, no. July/August, pp. 28–33, 2011.
-
(2011)
IEEE Network, No. July/August
, pp. 28-33
-
-
Lua, R.1
Yow, K.C.2
-
18
-
-
85045971126
-
Wang, “On-demand security architecture for cloud computing,” Computer, vol. 99, no
-
J. Chen, Y. Wang, and X. Wang, “On-demand security architecture for cloud computing,” Computer, vol. 99, no. PrePrints, 2012.
-
(2012)
Preprints
-
-
Chen, J.1
Wang, Y.2
-
19
-
-
85046000920
-
-
CloudWatch, http://aws.amazon.com/cloudwatch/.
-
-
-
-
20
-
-
85045984920
-
-
http://aws.amazon.com/ec2/pricing/.
-
-
-
-
21
-
-
79952414063
-
Image distribution mechanisms in large scale cloud providers
-
R. Wartel, T. Cass, B. Moreira, E. Roche, M. Guijarro, S. Goasguen, and U. Schwickerath, “Image distribution mechanisms in large scale cloud providers,” in Proceedings of the CloudCom, 2010, pp. 112–117.
-
(2010)
Proceedings of the Cloudcom
, pp. 112-117
-
-
Wartel, R.1
Cass, T.2
Moreira, B.3
Roche, E.4
Guijarro, M.5
Goasguen, S.6
Schwickerath, U.7
-
22
-
-
79960888404
-
Twinkle: A fast resource provisioning mechanism for internet services
-
J. Zhu, Z. Jiang, and Z. Xiao, “Twinkle: A fast resource provisioning mechanism for internet services,” in Proceedings of the INFOCOM, 2011, pp. 802–810.
-
(2011)
Proceedings of the INFOCOM
, pp. 802-810
-
-
Zhu, J.1
Jiang, Z.2
Xiao, Z.3
-
23
-
-
84966734285
-
Can we beat ddos attacks in clouds
-
S. Yu, Y. Tian, S. Guo, and D. O. Wu, “Can we beat ddos attacks in clouds,” IEEE Transactions on Parallel Distributed Systems, vol. accepted, 2013.
-
(2013)
IEEE Transactions on Parallel Distributed Systems
-
-
Yu, S.1
Tian, Y.2
Guo, S.3
Wu, D.O.4
-
24
-
-
84859728505
-
Performance analysis of cloud computing centers using m/g/m/m+r queuing systems
-
H. Khazaei, J. V. Misic, and V. B. Misic, “Performance analysis of cloud computing centers using m/g/m/m+r queuing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 5, pp. 936–943, 2012.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.5
, pp. 936-943
-
-
Khazaei, H.1
Misic, J.V.2
Misic, V.B.3
-
25
-
-
72249085365
-
The first erlang century - and the next
-
J. F. C. Kingman, “The first erlang century - and the next,” Queueing Systems, vol. 63, no. 1–4, pp. 3–12, 2009.
-
(2009)
Queueing Systems
, vol.63
, Issue.1-4
, pp. 3-12
-
-
Kingman, J.F.C.1
-
26
-
-
0003821875
-
-
Wiley Interscience, 1975, vol. I: Theory
-
L. Kleinrock, Queueing Systems. Wiley Interscience, 1975, vol. I: Theory.
-
Queueing Systems
-
-
Kleinrock, L.1
-
27
-
-
78649336830
-
The geometric efficient matching algorithm for firewalls
-
D. Rovniagin and A. Wool, “The geometric efficient matching algorithm for firewalls,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 147–159, 2011.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.1
, pp. 147-159
-
-
Rovniagin, D.1
Wool, A.2
-
28
-
-
84858632756
-
Detecting and resolving firewall policy anomalies
-
H. Hu, G.-J. Ahn, and K. Kulkarni, “Detecting and resolving firewall policy anomalies,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 318–331, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 318-331
-
-
Hu, H.1
Ahn, G.-J.2
Kulkarni, K.3
-
29
-
-
84858285031
-
Performance modeling and analysis of network firewalls
-
K. Salah, K. Elbadawi, and R. Boutaba, “Performance modeling and analysis of network firewalls,” IEEE Transactions on Network and Service Management, vol. 9, no. 1, pp. 12–21, 2012.
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, Issue.1
, pp. 12-21
-
-
Salah, K.1
Elbadawi, K.2
Boutaba, R.3
-
30
-
-
84891350551
-
A general cloud firewall framework with dynamic resource allocation
-
S. Yu, W. Zhou, R. Doss, and S. Guo, “A general cloud firewall framework with dynamic resource allocation,” in Proceedings of the IEEE ICC, 2013.
-
(2013)
Proceedings of the IEEE ICC
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
Guo, S.4
|