1P. A Cloud Computing Encapsulated Layer for Security and Availability
暂无分享,去创建一个
[1] Anirban Banerjee,et al. MPLS based mobility framework in 4G architectures , 2003, TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region.
[2] Rich Maggiani. Cloud computing is changing how we communicate , 2009, 2009 IEEE International Professional Communication Conference.
[3] Jiwu Shu,et al. Design and Implementation of an Out-of-Band Virtualization System for Large SANs , 2007, IEEE Transactions on Computers.
[4] Shinji Shimojo,et al. Future Internet: Challenges in Virtualization and Federation , 2009, 2009 Fifth Advanced International Conference on Telecommunications.
[5] Liwen He,et al. Pure MPLS Technology , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[6] M. Lynne Markus,et al. Technochange management: using IT to drive organizational change , 2004, J. Inf. Technol..
[7] Iván Arce,et al. Ghost in the Virtual Machine , 2007, IEEE Security & Privacy.
[8] Norbert A. Streitz,et al. Roomware-Moving Toward Ubiquitous Computers , 2002, IEEE Micro.
[9] Leendert van Doorn,et al. Virtualization and Hardware-Based Security , 2008, IEEE Security & Privacy.
[10] Iman Poernomo,et al. 12th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2008) , 2008, EDOC 2008.
[11] Michael D. Myers,et al. Dominant actors, political agendas, and strategic shifts over time: a critical ethnography of an enterprise systems implementation , 2004, J. Strateg. Inf. Syst..
[12] H.S. Kim,et al. GiSK: making secure, reliable and scalable VO repository virtualizing generic disks in the grid , 2005, Eighth International Conference on High-Performance Computing in Asia-Pacific Region (HPCASIA'05).
[13] N.K. Sehgal,et al. Applications of Virtualization for Server Management and Security , 2006, 2006 IEEE International Conference on Industrial Technology.
[14] Torsten Grust,et al. Multi-tenant databases for software as a service: schema-mapping techniques , 2008, SIGMOD Conference.
[15] Dean Jacobs. Implementing Software as a Service , 2008, EDOC.
[16] Anjali Agarwal,et al. Resiliency issues in MPLS networks , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[17] Raouf Boutaba,et al. Network virtualization: state of the art and research challenges , 2009, IEEE Communications Magazine.
[18] Sascha Uhrig,et al. Risks and chances of many-core processors , 2009, 2009 International Conference on High Performance Computing & Simulation.
[19] Lorin M. Hitt,et al. Productivity, Business Profitability, and Consumer Surplus: Three Different Measures of Information Technology Value , 1996, MIS Q..
[20] Fang Hao,et al. Enhancing dynamic cloud-based services using network virtualization , 2009, CCRV.
[21] Thomas Kern,et al. ERP critical success factors: an exploration of the contextual factors in public sector institutions , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[22] Nicholas G. Carr,et al. The Big Switch: Rewiring the World, from Edison to Google , 2008 .
[23] Dean Jacobs,et al. Enterprise Software as Service , 2005, ACM Queue.
[24] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[25] Yinong Chen,et al. SOAVM: A Service-Oriented Virtualization Management System with Automated Configuration , 2008, 2008 IEEE International Symposium on Service-Oriented System Engineering.
[26] Michael D. Myers,et al. When success turns into failure: a package-driven business process re-engineering project in the financial services industry , 1999, J. Strateg. Inf. Syst..
[27] Bongsug Chae,et al. Self-destructive dynamics in large-scale technochange and some ways of counteracting it , 2006, Inf. Technol. People.
[28] J. Lawrence,et al. Designing multiprotocol label switching networks , 2001, IEEE Commun. Mag..
[29] Daniel A. Menascé,et al. Autonomic Virtualized Environments , 2006, International Conference on Autonomic and Autonomous Systems (ICAS'06).
[30] Craig D. Weissman,et al. The design of the force.com multitenant internet application development platform , 2009, SIGMOD Conference.
[31] Qing Hu,et al. Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..
[32] Anand V. Hudli,et al. Level-4 SaaS applications for healthcare industry , 2009, COMPUTE '09.
[33] Claudia Eckert,et al. Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[34] David E. Culler,et al. Virtualization considered harmful: OS design directions for well-conditioned services , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[35] Zhang Jian,et al. The Optimization of Xen Network Virtualization , 2008, 2008 International Conference on Computer Science and Software Engineering.
[36] David C. Chou,et al. Analysis of a new information systems outsourcing practice: software-as-a-service business model , 2007, Int. J. Inf. Syst. Chang. Manag..
[37] Sang-Wook Kim,et al. Standard-based virtual infrastructure resource management for distributed and heterogeneous servers , 2009, 2009 11th International Conference on Advanced Communication Technology.
[38] Yanbo Han,et al. Business-Oriented Virtualization of Web Services A Case Study , 2008, 2008 IEEE International Symposium on Service-Oriented System Engineering.
[39] LiangHuigang,et al. Assimilation of enterprise systems , 2007 .
[40] Vincent Rijmen,et al. The Block Cipher Rijndael , 1998, CARDIS.
[41] Nicholas G. Carr,et al. Does IT Matter? Information Technology and the Corrosion of Competitive Advantage , 2004 .
[42] M. Porter,et al. How Information Gives You Competitive Advantage , 1985 .