Cloud Computing Synopsis and Recommendations
暂无分享,去创建一个
Timothy Grance | Mark Lee Badger | Robert Patt-Corner | M VoasJeffery | T. Grance | M. Badger | Robert Patt-Corner | M. VoasJeffery | Lee Badger | Jeff Voas | Lee Badger | Jeff Voas
[1] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.
[2] Paul V. Mockapetris,et al. Domain names: Concepts and facilities , 1983, RFC.
[3] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[4] Douglas E. Comer,et al. Internetworking with TCP/IP - Principles, Protocols, and Architectures, Fourth Edition , 1988 .
[5] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[6] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[7] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[8] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[9] Jeremy Epstein. Architecture and concepts of the ARGuE Guard , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[10] Yakov Rekhter,et al. BGP/MPLS VPNs , 1999, RFC.
[11] Howard Gobioff,et al. The Google file system , 2003, SOSP '03.
[12] Archana Ganapathi,et al. Why Do Internet Services Fail, and What Can Be Done About It? , 2002, USENIX Symposium on Internet Technologies and Systems.
[13] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[14] Andrew Warfield,et al. Live migration of virtual machines , 2005, NSDI.
[15] Tatu Ylönen,et al. The Secure Shell (SSH) Protocol Architecture , 2006, RFC.
[16] Jesse James Garrett. Ajax: A New Approach to Web Applications , 2007 .
[17] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[18] Leendert van Doorn,et al. Virtualization and Hardware-Based Security , 2008, IEEE Security & Privacy.
[19] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[20] Eli M. Dow,et al. Running Xen: A Hands-On Guide to the Art of Virtualization , 2008 .
[21] Eugene Ciurana,et al. Google App Engine , 2009 .
[22] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[23] Gautam Shroff. Enterprise Cloud Computing: Technology, Architecture, Applications , 2010 .
[24] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[25] Clodoaldo Robledo,et al. Google Web Toolkit , 2012 .