Non-deterministic security driven meta scheduler for distributed cloud organizations
暂无分享,去创建一个
Francesco Palmieri | Daniel Grzonka | Agnieszka Jakobik | F. Palmieri | Agnieszka Jakóbik | Daniel Grzonka
[1] Horacio González-Vélez,et al. Towards Secure Non-Deterministic Meta-Scheduling For Clouds , 2016, ECMS.
[2] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[3] Richard Hill,et al. Guide to Security Assurance for Cloud Computing , 2016, Computer Communications and Networks.
[4] Fatos Xhafa,et al. Integration of task abortion and security requirements in GA-based meta-heuristics for independent batch grid scheduling , 2012, Comput. Math. Appl..
[5] Fatos Xhafa,et al. Secure and Task Abortion Aware GA-Based Hybrid Metaheuristics for Grid Scheduling , 2010, PPSN.
[6] Massimo Torquati,et al. Parallel patterns for heterogeneous CPU/GPU architectures: Structured parallelism from cluster to cloud , 2014, Future Gener. Comput. Syst..
[7] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[8] Peter Desnoyers,et al. Scheduler vulnerabilities and coordinated attacks in cloud computing , 2013, J. Comput. Secur..
[9] Fatos Xhafa,et al. Meeting security and user behavior requirements in Grid scheduling , 2011, Simul. Model. Pract. Theory.
[10] Michael Wooldridge,et al. Intelligent agents: theory and practice The Knowledge Engineering Review , 1995 .
[11] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[12] Xiaorong Li,et al. SABA: A security-aware and budget-aware workflow scheduling strategy in clouds , 2015, J. Parallel Distributed Comput..
[13] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[14] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[15] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[16] Borja Sotomayor,et al. Enabling Cost-Effective Resource Leases with Virtual Machines , 2007 .
[17] R. Bala Chandar,et al. Towards reliable and secure resource scheduling in clouds , 2014, 2014 International Conference on Computer Communication and Informatics.
[18] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[19] Daniel Grzonka,et al. The Analysis of OpenStack Cloud Computing Platform: Features and Performance , 2015, Journal of Telecommunications and Information Technology.
[20] Agnieszka Jakóbik. A Cloud-aided Group RSA Scheme in Java 8 Environment and OpenStack Software , 2016 .
[21] Angelo Furfaro,et al. Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).
[22] Michael Wooldridge,et al. Introduction to multiagent systems , 2001 .
[23] Francesco Palmieri,et al. Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures , 2014, The Journal of Supercomputing.
[24] Zaina Afoulki. A Security-Aware Scheduler for Virtual Machines on IaaS Clouds , 2011 .
[25] LiGuo Huang,et al. A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds , 2016, Future Gener. Comput. Syst..
[26] Francesco Palmieri,et al. Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks , 2017, IEEE Systems Journal.
[27] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[28] Martin Gilje Jaatun,et al. Reference deployment models for eliminating user concerns on cloud security , 2010, The Journal of Supercomputing.
[29] Md. Rafiqul Islam,et al. Data Intensive Dynamic Scheduling Model and Algorithm for Cloud Computing Security , 2014, J. Comput..
[30] Douglas R. Stinson,et al. Pseudo-random Number Generation , 2005 .
[31] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems Artificial Neural Network Support to Monitoring of the Evolutionary Driven Security Aware Scheduling in Computational Distributed Environments , 2022 .
[32] Fei Teng,et al. Cloud Computing: Data-Intensive Computing and Scheduling , 2012 .
[33] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[34] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[35] Jinjun Chen,et al. CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing , 2013, Future Gener. Comput. Syst..
[36] Joanna Koodziej,et al. Evolutionary Hierarchical Multi-Criteria Metaheuristics for Scheduling in Large-Scale Grid Systems , 2012 .
[37] Helen D. Karatza,et al. A Simulation Study of Multi-criteria Scheduling in Grid Based on Genetic Algorithms , 2012, 2012 IEEE 10th International Symposium on Parallel and Distributed Processing with Applications.
[38] Joint Task Force Transformation Initiative,et al. Security and Privacy Controls for Federal Information Systems and Organizations , 2013 .