-
2
-
-
85038945903
-
-
Why Cloud Computing Should be at the Heart of Your Business
-
Why Cloud Computing Should be at the Heart of Your Business. [Online]. Available: http://www.telegraph.co.uk/business/ready-andenabled/cloud-computing/
-
-
-
-
4
-
-
85038885538
-
-
Feb.
-
L. Reading. (Feb. 2012). Orange/Sita Cloud Prepares for Takeoff. [Online]. Available: http://www.lightreading.com/services-apps/cloudservices/orange-sita-cloud-prepares-for-takeoff/d/d-id/693612
-
(2012)
Orange/Sita Cloud Prepares for Takeoff
-
-
Reading, L.1
-
5
-
-
84887500045
-
An open framework for accessing things as a service
-
Jun.
-
E. Mingozzi, G. Tanganelli, C. Vallati, and V. Di Gregorio, "An open framework for accessing things as a service, " in Proc. 16th Int. Symp. Wireless Pers. Multimedia Commun. (WPMC), Jun. 2013, pp. 1-5.
-
(2013)
Proc. 16th Int. Symp. Wireless Pers. Multimedia Commun. (WPMC)
, pp. 1-5
-
-
Mingozzi, E.1
Tanganelli, G.2
Vallati, C.3
Di Gregorio, V.4
-
6
-
-
84954123634
-
Review and analysis of networking challenges in cloud computing
-
Jan.
-
J. Moura and D. Hutchison, "Review and analysis of networking challenges in cloud computing, " J. Netw. Comput. Appl., vol. 60, pp. 113-129, Jan. 2016.
-
(2016)
J. Netw. Comput. Appl.
, vol.60
, pp. 113-129
-
-
Moura, J.1
Hutchison, D.2
-
7
-
-
84904338107
-
Vision: The case for cellular small cells for cloudlets
-
S. Agarwal, M. Philipose, and P. Bahl, "Vision: The case for cellular small cells for cloudlets, " in Proc. 5th Int. Workshop Mobile Cloud Comput. Serv., 2014, pp. 1-5.
-
(2014)
Proc. 5th Int. Workshop Mobile Cloud Comput. Serv.
, pp. 1-5
-
-
Agarwal, S.1
Philipose, M.2
Bahl, P.3
-
8
-
-
84873461516
-
The brewing storm in cloud gaming: A measurement study on cloud to end-user latency
-
S. Choy, B. Wong, G. Simon, and C. Rosenberg, "The brewing storm in cloud gaming: A measurement study on cloud to end-user latency, " in Proc. 11th Annu. Workshop Netw. Syst. Support Games, 2012, pp. 1-6.
-
(2012)
Proc. 11th Annu. Workshop Netw. Syst. Support Games
, pp. 1-6
-
-
Choy, S.1
Wong, B.2
Simon, G.3
Rosenberg, C.4
-
9
-
-
84952318359
-
Managing IT operations in a clouddriven enterprise: Case studies
-
R. P. Padhy and M. R. Patra, "Managing IT operations in a clouddriven enterprise: Case studies, " Amer. J. Cloud Comput., vol. 1, no. 1, pp. 1-18, 2013.
-
(2013)
Amer. J. Cloud Comput.
, vol.1
, Issue.1
, pp. 1-18
-
-
Padhy, R.P.1
Patra, M.R.2
-
10
-
-
85015323275
-
Cloud computing: A survey on its limitations and potential solutions
-
M. M. Islam, S. Morshed, P. Goswami, and B. Dhaka, "Cloud computing: A survey on its limitations and potential solutions, " Int. J. Comput. Sci. Issues, vol. 10, no. 4, pp. 159-163, 2013.
-
(2013)
Int. J. Comput. Sci. Issues
, vol.10
, Issue.4
, pp. 159-163
-
-
Islam, M.M.1
Morshed, S.2
Goswami, P.3
Dhaka, B.4
-
11
-
-
84977268028
-
Edge-centric computing: Vision and challenges
-
P. G. Lopez et al., "Edge-centric computing: Vision and challenges, " ACM SIGCOMM Comput. Commun. Rev., vol. 45, no. 5, pp. 37-42, 2015.
-
(2015)
ACM SIGCOMM Comput. Commun. Rev.
, vol.45
, Issue.5
, pp. 37-42
-
-
Lopez, P.G.1
-
12
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things, " in Proc. 1st Ed. MCC Workshop Mobile Cloud Comput., 2012, pp. 13-16.
-
(2012)
Proc. 1st Ed. MCC Workshop Mobile Cloud Comput.
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
13
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
Dec.
-
H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: Architecture, applications, and approaches, " Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587-1611, Dec. 2013. [Online]. Available: http://dx.doi.org/10.1002/wcm.1203
-
(2013)
Wireless Commun. Mobile Comput.
, vol.13
, Issue.18
, pp. 1587-1611
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
17
-
-
84890363428
-
Critical cloud computing-A CIIP perspective on cloud computing services
-
Agency, Heraklion, Greece, Tech. Rep.
-
M. Dekker, "Critical cloud computing-A CIIP perspective on cloud computing services, " Eur. Netw. Inf. Secur. Agency, Heraklion, Greece, Tech. Rep., 2012.
-
(2012)
Eur. Netw. Inf. Secur.
-
-
Dekker, M.1
-
18
-
-
84871238140
-
The power of cloud: Driving business model innovation
-
S. Berman, L. Kesterson-Townes, A. Marshall, and R. Srivathsa, "The power of cloud: Driving business model innovation, " IBM Inst. for Bus. Value, Tech. Rep., 2012.
-
(2012)
IBM Inst. for Bus. Value, Tech. Rep.
-
-
Berman, S.1
Kesterson-Townes, L.2
Marshall, A.3
Srivathsa, R.4
-
19
-
-
84905989927
-
Extending the cloud with fog: Security challenges & opportunities
-
J. Shropshire, "Extending the cloud with fog: Security challenges & opportunities, " in Proc. 20th Amer. Conf. Inf. Syst., 2014, pp. 1-10.
-
(2014)
Proc. 20th Amer. Conf. Inf. Syst.
, pp. 1-10
-
-
Shropshire, J.1
-
20
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "All your clouds are belong to us: Security analysis of cloud management interfaces, " in Proc. 3rd ACM Workshop Cloud Comput. Secur. Workshop, 2011, pp. 3-14.
-
(2011)
Proc. 3rd ACM Workshop Cloud Comput. Secur. Workshop
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Iacono, L.L.6
-
21
-
-
77953248995
-
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
-
J. P. Sterbenz et al., "Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, " Comput. Netw., vol. 54, no. 8, pp. 1245-1265, 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.8
, pp. 1245-1265
-
-
Sterbenz, J.P.1
-
23
-
-
84904576706
-
Elasticity in cloud computing: What it is, and what it is not
-
N. R. Herbst, S. Kounev, and R. H. Reussner, "Elasticity in cloud computing: What it is, and what it is not, " in Proc. ICAC, 2013, pp. 23-27.
-
(2013)
Proc. ICAC
, pp. 23-27
-
-
Herbst, N.R.1
Kounev, S.2
Reussner, R.H.3
-
25
-
-
84903602200
-
Providing dependability and resilience in the cloud: Challenges and opportunities
-
Springer
-
S. Kounev et al., "Providing dependability and resilience in the cloud: Challenges and opportunities, " in Resilience Assessment and Evaluation of Computing Systems. Springer, 2012, pp. 65-81.
-
(2012)
Resilience Assessment and Evaluation of Computing Systems.
, pp. 65-81
-
-
Kounev, S.1
-
26
-
-
85038970528
-
-
Framework and Reference Architecture, ETSI, Sophia Antipolis, France vol. 3, p. V1.
-
Framework and Reference Architecture, ETSI, Sophia Antipolis, France vol. 3, p. V1.
-
-
-
-
29
-
-
85038957356
-
-
GS MEC 003-V1.1.1-Mobile Edge Computing (MEC); Framework and Reference Architecture, E. GS
-
GS MEC 003-V1.1.1-Mobile Edge Computing (MEC); Framework and Reference Architecture, E. GS.
-
-
-
-
30
-
-
85008245198
-
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
-
Jan.
-
R. Roman, J. Lopez, and M. Mambo, "Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges, " Future Generat. Comput. Syst., vol. 78, pp. 680-698, Jan. 2018.
-
(2018)
Future Generat. Comput. Syst.
, vol.78
, pp. 680-698
-
-
Roman, R.1
Lopez, J.2
Mambo, M.3
-
31
-
-
85038896082
-
-
Mobile CORD (Central Office Re-Architected as a Datacenter), ONF
-
Mobile CORD (Central Office Re-Architected as a Datacenter), ONF.
-
-
-
-
33
-
-
85010304048
-
A double-tier MEC-NFV architecture: Design and optimisation
-
Oct.
-
V. Sciancalepore, F. Giust, K. Samdanis, and Z. Yousaf, "A double-tier MEC-NFV architecture: Design and optimisation, " in Proc. IEEE Conf. Standards for Commun. Netw. (CSCN), Oct. 2016, pp. 1-6.
-
(2016)
Proc. IEEE Conf. Standards for Commun. Netw. (CSCN)
, pp. 1-6
-
-
Sciancalepore, V.1
Giust, F.2
Samdanis, K.3
Yousaf, Z.4
-
36
-
-
84951050684
-
A survey of fog computing: Concepts, applications and issues
-
S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues, " in Proc. Workshop Mobile Big Data, 2015, pp. 37-42.
-
(2015)
Proc. Workshop Mobile Big Data
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.3
-
37
-
-
85010031130
-
Fog and IoT: An overview of research opportunities
-
Dec.
-
M. Chiang and T. Zhang, "Fog and IoT: An overview of research opportunities, " IEEE Internet Things J., vol. 3, no. 6, pp. 854-864, Dec. 2016.
-
(2016)
IEEE Internet Things J.
, vol.3
, Issue.6
, pp. 854-864
-
-
Chiang, M.1
Zhang, T.2
-
38
-
-
84969509112
-
Fog computing: Platform and applications
-
Nov.
-
S. Yi, Z. Hao, Z. Qin, and Q. Li, "Fog computing: Platform and applications, " in Proc. 3rd IEEE Workshop Hot Topics Web Syst. Technol., Nov. 2015, pp. 73-78.
-
(2015)
Proc. 3rd IEEE Workshop Hot Topics Web Syst. Technol.
, pp. 73-78
-
-
Yi, S.1
Hao, Z.2
Qin, Z.3
Li, Q.4
-
40
-
-
84943612463
-
Security and privacy issues of fog computing: A survey
-
S. Yi, Z. Qin, and Q. Li, "Security and privacy issues of fog computing: A survey, " in Proc. Int. Conf. Wireless Algorithms, Syst., Appl., 2015, pp. 685-695.
-
(2015)
Proc. Int. Conf. Wireless Algorithms, Syst., Appl.
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
41
-
-
84897101278
-
Security policy verification for multi-domains in cloud systems
-
A. Gouglidis, I. Mavridis, and V. C. Hu, "Security policy verification for multi-domains in cloud systems, " Int. J. Inf. Secur., vol. 13, no. 2, pp. 97-111, 2014.
-
(2014)
Int. J. Inf. Secur.
, vol.13
, Issue.2
, pp. 97-111
-
-
Gouglidis, A.1
Mavridis, I.2
Hu, V.C.3
-
42
-
-
84861095268
-
DomRBAC: An access control model for modern collaborative systems
-
A. Gouglidis and I. Mavridis, "domRBAC: An access control model for modern collaborative systems, " Comput. Secur., vol. 31, no. 4, pp. 540-556, 2012. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404812000144
-
(2012)
Comput. Secur.
, vol.31
, Issue.4
, pp. 540-556
-
-
Gouglidis, A.1
Mavridis, I.2
-
43
-
-
84941286216
-
Policy-driven security management for fog computing: Preliminary framework and a case study
-
Aug.
-
C. Dsouza, G.-J. Ahn, and M. Taguinod, "Policy-driven security management for fog computing: Preliminary framework and a case study, " in Proc. IEEE 15th Int. Conf. Inf. Reuse Integr. (IRI), Aug. 2014, pp. 16-23.
-
(2014)
Proc. IEEE 15th Int. Conf. Inf. Reuse Integr. (IRI)
, pp. 16-23
-
-
Dsouza, C.1
Ahn, G.-J.2
Taguinod, M.3
-
44
-
-
3342966061
-
The ganglia distributed monitoring system: Design, implementation, and experience
-
M. L. Massie, B. N. Chun, and D. E. Culler, "The ganglia distributed monitoring system: Design, implementation, and experience, " Parallel Comput., vol. 30, no. 7, pp. 817-840, 2004.
-
(2004)
Parallel Comput.
, vol.30
, Issue.7
, pp. 817-840
-
-
Massie, M.L.1
Chun, B.N.2
Culler, D.E.3
-
45
-
-
21844451436
-
A scalable distributed information management system
-
P. Yalagandula and M. Dahlin, "A scalable distributed information management system, " ACM SIGCOMM Comput. Commun. Rev., vol. 34, no. 4, pp. 379-390, 2004.
-
(2004)
ACM SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.4
, pp. 379-390
-
-
Yalagandula, P.1
Dahlin, M.2
-
46
-
-
84876261476
-
Towards highly reliable enterprise network services via inference of multi-level dependencies
-
P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang, "Towards highly reliable enterprise network services via inference of multi-level dependencies, " ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 13-24, 2007.
-
(2007)
ACM SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.4
, pp. 13-24
-
-
Bahl, P.1
Chandra, R.2
Greenberg, A.3
Kandula, S.4
Maltz, D.A.5
Zhang, M.6
-
47
-
-
80052780610
-
Statistical techniques for online anomaly detection in data centers
-
May
-
C. Wang, K. Viswanathan, L. Choudur, V. Talwar, W. Satterfield, and K. Schwan, "Statistical techniques for online anomaly detection in data centers, " in Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage. (IM), May 2011, pp. 385-392.
-
(2011)
Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage. (IM)
, pp. 385-392
-
-
Wang, C.1
Viswanathan, K.2
Choudur, L.3
Talwar, V.4
Satterfield, W.5
Schwan, K.6
-
48
-
-
84906748850
-
Exploring time and frequency domains for accurate and automated anomaly detection in cloud computing systems
-
Dec.
-
Q. Guan, S. Fu, N. DeBardeleben, and S. Blanchard, "Exploring time and frequency domains for accurate and automated anomaly detection in cloud computing systems, " in Proc. IEEE 19th Pacific Rim Int. Symp. Dependable Comput. (PRDC), Dec. 2013, pp. 196-205.
-
(2013)
Proc. IEEE 19th Pacific Rim Int. Symp. Dependable Comput. (PRDC)
, pp. 196-205
-
-
Guan, Q.1
Fu, S.2
DeBardeleben, N.3
Blanchard, S.4
-
49
-
-
84925841628
-
Assessing the impact of intra-cloud live migration on anomaly detection
-
Oct.
-
S. N. Shirazi, S. Simpson, A. Marnerides, M. Watson, A. Mauthe, and D. Hutchison, "Assessing the impact of intra-cloud live migration on anomaly detection, " in Proc. IEEE 3rd Int. Conf. Cloud Netw. (CloudNet), Oct. 2014, pp. 52-57.
-
(2014)
Proc. IEEE 3rd Int. Conf. Cloud Netw. (CloudNet)
, pp. 52-57
-
-
Shirazi, S.N.1
Simpson, S.2
Marnerides, A.3
Watson, M.4
Mauthe, A.5
Hutchison, D.6
-
50
-
-
78650479309
-
-
Google, Menlo Park, CA, USA, Tech. Rep.
-
B. H. Sigelman et al., "Dapper, a large-scale distributed systems tracing infrastructure, " Google, Menlo Park, CA, USA, Tech. Rep., 2010.
-
(2010)
Dapper, A Large-scale Distributed Systems Tracing Infrastructure
-
-
Sigelman, B.H.1
-
51
-
-
76749154505
-
EbAT: Online methods for detecting utility cloud anomalies
-
Art. no. 4
-
C. Wang, "EbAT: Online methods for detecting utility cloud anomalies, " in Proc. 6th Middleware Doctoral Symp., 2009, Art. no. 4.
-
(2009)
Proc. 6th Middleware Doctoral Symp.
-
-
Wang, C.1
-
53
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
T. Garfinkel and M. Rosenblum, "A virtual machine introspection based architecture for intrusion detection, " in Proc. NDSS, vol. 3. 2003, pp. 191-206.
-
(2003)
Proc. NDSS
, vol.3
, pp. 191-206
-
-
Garfinkel, T.1
Rosenblum, M.2
-
54
-
-
85014161135
-
Anomaly detection in the cloud using data density
-
S. N. Shirazi, S. Simpson, A. Gouglidis, A. U. Mauthe, and D. Hutchison, "Anomaly detection in the cloud using data density, " in Proc. IEEE Int. Conf. Cloud Comput., Jun. 2016, pp. 616-623.
-
(2016)
Proc. IEEE Int. Conf. Cloud Comput., Jun.
, pp. 616-623
-
-
Shirazi, S.N.1
Simpson, S.2
Gouglidis, A.3
Mauthe, A.U.4
Hutchison, D.5
-
56
-
-
84939938150
-
A framework for resilience management in the cloud
-
S. N. Shirazi, S. Simpson, S. Oechsner, A. Mauthe, and D. Hutchison, "A framework for resilience management in the cloud, " E I Elektrotechnik Informationstechnik, vol. 132, no. 2, pp. 122-132, 2015.
-
(2015)
E i Elektrotechnik Informationstechnik
, vol.132
, Issue.2
, pp. 122-132
-
-
Shirazi, S.N.1
Simpson, S.2
Oechsner, S.3
Mauthe, A.4
Hutchison, D.5
|