SLA-DO: A SLA-Based Data Distribution Strategy on Multiple Cloud Storage Systems
暂无分享,去创建一个
Ying Li | Zhonghai Wu | Chang Guo | Ying Li | Zhonghai Wu | Chang Guo
[1] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[2] Helen J. Wang,et al. Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.
[3] Rajkumar Buyya,et al. SLA-Based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[4] T. Grance,et al. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .
[5] Yun Yang,et al. A Novel Cost-Effective Dynamic Data Replication Strategy for Reliability in Cloud Data Centres , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[6] S.A. Brandt,et al. CRUSH: Controlled, Scalable, Decentralized Placement of Replicated Data , 2006, ACM/IEEE SC 2006 Conference (SC'06).
[7] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[8] J. Koenderink. Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.
[9] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[10] Bin Tang,et al. Data Replication in Data Intensive Scientific Applications with Performance Guarantee , 2011, IEEE Transactions on Parallel and Distributed Systems.
[11] Ayob Sether,et al. Cloud Computing Benefits , 2016 .
[12] Hairong Kuang,et al. The Hadoop Distributed File System , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).
[13] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[14] Ju Wang,et al. Windows Azure Storage: a highly available cloud storage service with strong consistency , 2011, SOSP.
[15] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[16] Ryan K. L. Ko,et al. Cloud computing vulnerability incidents: a statistical overview , 2013 .
[18] Bharat K. Bhargava,et al. Protection of Identity Information in Cloud Computing without Trusted Third Party , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[19] Wei Chen,et al. MORM: A Multi-objective Optimized Replication Management strategy for cloud storage cluster , 2014, J. Syst. Archit..
[20] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[21] Zhonghai Wu,et al. User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[22] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[23] Elizabeth Chang,et al. Conceptual SLA framework for cloud computing , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.
[24] Bharat K. Bhargava,et al. An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[25] Moni Naor,et al. Theory and Applications of Models of Computation , 2015, Lecture Notes in Computer Science.
[26] Layuan Li,et al. Efficient resource allocation for optimizing objectives of cloud users, IaaS provider and SaaS provider in cloud environment , 2013, The Journal of Supercomputing.
[27] Boleslaw K. Szymanski,et al. Simulation of dynamic data replication strategies in Data Grids , 2003, Proceedings International Parallel and Distributed Processing Symposium.
[28] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .
[29] Chen Wang,et al. Systematic Analysis of Public Cloud Service Level Agreements and Related Business Values , 2013, 2013 IEEE International Conference on Services Computing.