Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review
暂无分享,去创建一个
[1] Geoffrey C. Fox,et al. High Performance Parallel Computing with Clouds and Cloud Technologies , 2009, CloudComp.
[2] Yongzhao Zhan,et al. A hash-based secure interface on plain connection , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).
[3] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[4] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[5] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[6] T. Grance,et al. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .
[7] Xiaojiang Du,et al. Prometheus: Privacy-aware data retrieval on hybrid cloud , 2013, 2013 Proceedings IEEE INFOCOM.
[8] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[9] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[10] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[11] Jayant Baliga,et al. Energy Consumption in Access Networks , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.
[12] L. Youseff,et al. Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.
[13] Anthony Sulistio,et al. Private cloud for collaboration and e-Learning services: from IaaS to SaaS , 2010, Computing.
[14] S. O. Kuyoro,et al. Cloud computing security issues and challenges , 2011 .
[15] Pushpendra Kumar Pateriya,et al. A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment , 2013 .
[16] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[17] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[18] S. Goyal. Perils of Cloud Based Enterprise Resource Planning , 2013 .
[19] Gerard Briscoe,et al. Community Cloud Computing , 2009, CloudCom.
[20] Rajkumar Buyya,et al. Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities , 2009, 2009 International Conference on High Performance Computing & Simulation.
[21] Andrew Charlesworth,et al. Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.
[22] S. Srinivasan,et al. Data property analyzer for information storage in cloud , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.
[23] Dengguo Feng,et al. Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .
[24] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[25] Alexandru Iosup,et al. A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing , 2009, CloudComp.
[26] Michael Anthony Bauer,et al. A Data Management in a Private Cloud Storage Environment Utilizing High Performance Distributed File Systems , 2013, 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[27] Zhang Min,et al. Study on Cloud Computing Security , 2011 .
[28] Jinjun Chen,et al. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.
[29] Rajkumar Buyya,et al. Managing Peak Loads by Leasing Cloud Infrastructure Services from a Spot Market , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).
[30] Xi He,et al. Cloud Computing: a Perspective Study , 2010, New Generation Computing.
[31] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[32] Judith Hurwitz,et al. Cloud Computing for Dummies , 2009 .
[33] Michael Missbach,et al. Private Cloud Infrastructures for SAP , 2016 .
[34] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[35] Lizhe Wang,et al. Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[36] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[37] Rajkumar Buyya,et al. Cloudbus Toolkit for Market-Oriented Cloud Computing , 2009, CloudCom.
[38] Shamim Hossain. Infrastructure as a Service , 2013 .
[39] George Reese,et al. Cloud application architectures , 2009 .
[40] Won Kim,et al. Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..
[41] Gurudatt Kulkarni,et al. A NEW APPROACH TO HYBRID CLOUD , 2012 .
[42] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[43] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[44] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[45] Franck Cappello,et al. Cost-benefit analysis of Cloud Computing versus desktop grids , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[46] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[47] Mark Ryan,et al. Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.
[48] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[49] Christoph Meinel,et al. Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).
[50] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[51] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[52] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[53] Rich Kaestner,et al. The Basics of Cloud Computing. , 2012 .
[54] Robert L. Grossman,et al. The Case for Cloud Computing , 2009, IT Professional.
[55] Liang Yan,et al. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.
[56] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[57] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[58] Dave Durkee,et al. Why Cloud Computing Will Never Be Free , 2010, ACM Queue.
[59] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[60] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[61] Oskar Hamrén,et al. Mobile phones and cloud computing : A quantitative research paper on mobile phone application offloading by cloud computing utilization , 2012 .
[62] F. A. Alshuwaier,et al. Applications of cloud computing in education , 2012, 2012 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC).
[63] Singh Ghuman,et al. Cloud Computing-A Study of Infrastructure as a Service , 2015 .
[64] Muli Ben-Yehuda,et al. The Reservoir model and architecture for open federated cloud computing , 2009, IBM J. Res. Dev..
[65] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[66] Mladen A. Vouk,et al. Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.
[67] Anton Beloglazov,et al. Energy-efficient management of virtual machines in data centers for cloud computing , 2013 .
[68] Albert Mo Kim Cheng,et al. Autonomic computing architecture for real-time medical application running on virtual private cloud infrastructures , 2013, SIGBED.
[69] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[70] Marin Litoiu,et al. Feedback-based optimization of a private cloud , 2012, Future Gener. Comput. Syst..
[71] Radu Prodan,et al. A survey and taxonomy of infrastructure as a service and web hosting cloud providers , 2009, 2009 10th IEEE/ACM International Conference on Grid Computing.
[72] Min Liu,et al. Process-based Security Detection Approach for Virtual Machines on Private Cloud Platforms , 2013, J. Networks.
[73] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[74] David E. Y. Sarna,et al. Implementing and Developing Cloud Computing Applications , 2010 .
[75] Bofeng Zhang,et al. Comparison of Several Cloud Computing Platforms , 2009, 2009 Second International Symposium on Information Science and Engineering.
[76] Christoph Meinel,et al. Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[77] Neal Leavitt,et al. Is Cloud Computing Really Ready for Prime Time? , 2009, Computer.
[78] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[79] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[80] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[81] Danny Garber,et al. Windows Azure Hybrid Cloud , 2013 .
[82] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .