Toward cost effective and optimal selection of IT disaster recovery cloud solution
暂无分享,去创建一个
[1] Sherif Sakr,et al. Incorporating Uncertainty into In-Cloud Application Deployment Decisions for Availability , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[2] Arun Venkataramani,et al. Disaster Recovery as a Cloud Service: Economic Benefits & Deployment Challenges , 2010, HotCloud.
[3] Yashwant K. Malaiya,et al. Assessing Disaster Recovery Alternatives: On-Site, Colocation or Cloud , 2012, 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops.
[4] Long Wang,et al. Disaster Recovery for Cloud-Hosted Enterprise Applications , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).
[5] Bob Duncan,et al. Enhancing cloud security and privacy: Time for a new approach? , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).
[6] Qing Tan,et al. Benefits and challenges of three cloud computing service models , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).
[7] Chuanyi Liu,et al. DR-Cloud: Multi-cloud based disaster recovery service , 2014 .
[8] Abdellah Ezzati,et al. Cloud security and privacy model for providing secure cloud services , 2016, 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech).
[9] S. Suguna,et al. Overview of data backup and disaster recovery in cloud , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[10] Long Wang,et al. Experiences with Building Disaster Recovery for Enterprise-Class Clouds , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[11] Elizabeth B. Lennon. Contingency Planning Guide for Information Technology Systems | NIST , 2002 .
[12] Wasif Gilani,et al. A Model-Driven Framework for Process-Centric Business Continuity Management , 2010, 2010 Seventh International Conference on the Quality of Information and Communications Technology.
[13] Naim Ahmad,et al. Cloud computing: Technology, security issues and solutions , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).
[14] Timothy Grance,et al. Contingency Planning Guide For Information Technology Systems: Recommendations Of The National Institute Of Standards And Technology , 2004 .
[15] Gerald Quirchmayr,et al. Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology , 2008, 2008 Third International Conference on Availability, Reliability and Security.