-
2
-
-
84960173045
-
Microarchitecture-Aware virtual machine placement under information leakage constraints
-
A. Lefray, E. Caron, J. Rouzaud-Cornabas, and C. Toinard, "Microarchitecture-Aware virtual machine placement under information leakage constraints, " in 8th IEEE International Conference on Cloud Computing, CLOUD 2015, 2015, pp. 588-595.
-
(2015)
8th EEE International Conference on Cloud Computing, CLOUD 2015
, pp. 588-595
-
-
Lefray, A.1
Caron, E.2
Rouzaud-Cornabas, J.3
Toinard, C.4
-
3
-
-
84886723209
-
A survey on security issues and solutions at different layers of cloud computing
-
C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, "A survey on security issues and solutions at different layers of cloud computing, " The Journal of Supercomputing, vol. 63, no. 2, pp. 561-592, 2013.
-
(2013)
The Journal of Supercomputing
, vol.63
, Issue.2
, pp. 561-592
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, A.4
Rajarajan, M.5
-
4
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar, "Innovative instructions and software model for isolated execution, " in Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013.
-
(2013)
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
5
-
-
84939815146
-
Allocation of virtual machines in cloud data centers-A survey of problem models and optimization algorithms
-
Z. A. Mann, "Allocation of virtual machines in cloud data centers-A survey of problem models and optimization algorithms, " ACM Computing Surveys, vol. 48, no. 1, 2015.
-
(2015)
ACM Computing Surveys
, vol.48
, Issue.1
-
-
Mann, Z.A.1
-
8
-
-
84947080253
-
Study and performance analysis of various VM placement strategies
-
M. R. Chowdhury, M. R. Mahmud, and R. M. Rahman, "Study and performance analysis of various VM placement strategies, " in 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2015.
-
(2015)
16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
-
-
Chowdhury, M.R.1
Mahmud, M.R.2
Rahman, R.M.3
-
9
-
-
84964354224
-
Continuous datacenter consolidation
-
P. Svärd, W. Li, E. Wadbro, J. Tordsson, and E. Elmroth, "Continuous datacenter consolidation, " in IEEE 7th International Conference on Cloud Computing Technology and Science, 2015, pp. 387-396.
-
(2015)
IEEE 7th International Conference on Cloud Computing Technology and Science
, pp. 387-396
-
-
Svärd, P.1
Li, W.2
Wadbro, E.3
Tordsson, J.4
Elmroth, E.5
-
10
-
-
84901654238
-
Cost-optimal cloud service placement under dynamic pricing schemes
-
W. Li, P. Svärd, J. Tordsson, and E. Elmroth, "Cost-optimal cloud service placement under dynamic pricing schemes, " in Proceedings of the 6th IEEE/ACM International Conference on Utility and Cloud Computing, 2013, pp. 187-194.
-
(2013)
Proceedings of the 6th IEEE/ACM International Conference on Utility and Cloud Computing
, pp. 187-194
-
-
Li, W.1
Svärd, P.2
Tordsson, J.3
Elmroth, E.4
-
11
-
-
84883721654
-
A virtual machine re-packing approach to the horizontal vs vertical elasticity trade-off for cloud autoscaling
-
M. Sedaghat, F. Hernandez-Rodriguez, and E. Elmroth, "A virtual machine re-packing approach to the horizontal vs. vertical elasticity trade-off for cloud autoscaling, " in Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, 2013, article nr. 6.
-
(2013)
Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference
, Issue.6
-
-
Sedaghat, M.1
Hernandez-Rodriguez, F.2
Elmroth, E.3
-
12
-
-
84924078614
-
Idea: Optimising multi-cloud deployments with security controls as constraints
-
Springer
-
P. Massonet, J. Luna, A. Pannetrat, and R. Trapero, "Idea: Optimising multi-cloud deployments with security controls as constraints, " in Engineering Secure Software and Systems-7th International Symposium. Springer, 2015, pp. 102-110.
-
(2015)
Engineering Secure Software and Systems-7th International Symposium
, pp. 102-110
-
-
Massonet, P.1
Luna, J.2
Pannetrat, A.3
Trapero, R.4
-
13
-
-
84884484360
-
Negotiating and brokering cloud resources based on security level agreements
-
J. L. Garcia, T. Vateva-Gurova, N. Suri, M. Rak, and L. Liccardo, "Negotiating and brokering cloud resources based on security level agreements, " in Proceedings of the 3rd International Conference on Cloud Computing and Services Science, 2013, pp. 533-541.
-
(2013)
Proceedings of the 3rd International Conference on Cloud Computing and Services Science
, pp. 533-541
-
-
Garcia, J.L.1
Vateva-Gurova, T.2
Suri, N.3
Rak, M.4
Liccardo, L.5
-
15
-
-
85010420998
-
Security-Aware virtual machine placement in cloud data center
-
Springer
-
S. Shetty, X. Yuchi, and M. Song, "Security-Aware virtual machine placement in cloud data center, " in Moving Target Defense for Distributed Systems. Springer, 2016, pp. 13-24.
-
(2016)
Moving Target Defense for Distributed Systems
, pp. 13-24
-
-
Shetty, S.1
Yuchi, X.2
Song, M.3
-
16
-
-
70349908112
-
Variability modeling to support customization and deployment of multi-Tenantaware Software as a Service applications
-
R. Mietzner, A. Metzger, F. Leymann, and K. Pohl, "Variability modeling to support customization and deployment of multi-Tenantaware Software as a Service applications, " in Proceedings of the 2009 ICSE Workshop on Principles of Engineering Service Oriented Systems (PESOS09), 2009, pp. 18-25.
-
(2009)
Proceedings of the 2009 ICSE Workshop on Principles of Engineering Service Oriented Systems (PESOS09
, pp. 18-25
-
-
Mietzner, R.1
Metzger, A.2
Leymann, F.3
Pohl, K.4
-
19
-
-
84928985838
-
Rigorous results on the effectiveness of some heuristics for the consolidation of virtual machines in a cloud data center
-
Z. A. Mann, "Rigorous results on the effectiveness of some heuristics for the consolidation of virtual machines in a cloud data center, " Future Generation Computer Systems, vol. 51, pp. 1-6, 2015.
-
(2015)
Future Generation Computer Systems
, vol.51
, pp. 1-6
-
-
Mann, Z.A.1
-
20
-
-
85021444139
-
The CoCoME platform for collaborative empirical research on information system evolution
-
R. Heinrich, K. Rostami, and R. Reussner, "The CoCoME platform for collaborative empirical research on information system evolution, " Karlsruhe Reports in Informatics, Tech. Rep., 2016.
-
(2016)
Karlsruhe Reports in Informatics, Tech. Rep
-
-
Heinrich, R.1
Rostami, K.2
Reussner, R.3
-
22
-
-
84894468698
-
A baremetal and asymmetric partitioning approach to client virtualization
-
Y. Zhou, Y. Zhang, H. Liu, N. Xiong, and A. V. Vasilakos, "A baremetal and asymmetric partitioning approach to client virtualization, " IEEE Transactions on Services Computing, vol. 7, no. 1, pp. 40-53, 2014.
-
(2014)
IEEE Transactions on Services Computing
, vol.7
, Issue.1
, pp. 40-53
-
-
Zhou, Y.1
Zhang, Y.2
Liu, H.3
Xiong, N.4
Vasilakos, A.V.5
-
23
-
-
80051610521
-
An empirical study on memory sharing of virtual machines for server consolidation
-
C. R. Chang, J. J. Wu, and P. Liu, "An empirical study on memory sharing of virtual machines for server consolidation, " in IEEE 9th International Symposium on Parallel and Distributed Processing with Applications, 2011, pp. 244-249.
-
(2011)
IEEE 9th International Symposium on Parallel and Distributed Processing with Applications
, pp. 244-249
-
-
Chang, C.R.1
Wu, J.J.2
Liu, P.3
-
24
-
-
53349163432
-
An integrated approach to resource pool management: Policies, efficiency and quality metrics
-
D. Gmach, J. Rolia, L. Cherkasova, G. Belrose, T. Turicchi, and A. Kemper, "An integrated approach to resource pool management: Policies, efficiency and quality metrics, " in IEEE International Conference on Dependable Systems and Networks, 2008, pp. 326-335.
-
(2008)
IEEE International Conference on Dependable Systems and Networks
, pp. 326-335
-
-
Gmach, D.1
Rolia, J.2
Cherkasova, L.3
Belrose, G.4
Turicchi, T.5
Kemper, A.6
-
25
-
-
84954526725
-
Resource stealing: A resource multiplexing method for mix workloads in cloud system
-
Y. Tan, F. Wu, Q. Wu, and X. Liao, "Resource stealing: A resource multiplexing method for mix workloads in cloud system, " The Journal of Supercomputing, pp. doi:10.1007/s11 227-015-1609-3, 2016.
-
(2016)
The Journal of Supercomputing
-
-
Tan, Y.1
Wu, F.2
Wu, Q.3
Liao, X.4
|