The Role of Virtualization Techniques to Overcome the Challenges in Cloud Computing
暂无分享,去创建一个
[1] Karen A. Scarfone,et al. Guide to Security for Full Virtualization Technologies , 2011 .
[2] Werner Dubitzky,et al. Large-Scale Computing Techniques for Complex System Simulations , 2011 .
[3] Yunchuan Sun,et al. Constructing the Web of Events from raw data in the Web of Things , 2014, Mob. Inf. Syst..
[4] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[5] Zahir Tari,et al. Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.
[6] Prashant J. Shenoy,et al. Agile dynamic provisioning of multi-tier Internet applications , 2008, TAAS.
[7] Jin B. Hong,et al. Availability Modeling and Analysis of a Virtualized System , 2009, 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing.
[8] Christoph Meinel,et al. Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).
[9] Sami Tabbane,et al. State of the Art and Research Challenges of new services architecture technologies: Virtualization, SOA and Cloud Computing , 2010 .
[10] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[11] V. R. Wadhankar,et al. A Survey Paper on security Enhancement for Privacy Preservation in Cloud Computing by Anonymous Request Access , 2015 .
[12] Baijian Yang,et al. Securing Virtualized Datacenters , 2014, ArXiv.
[13] Deep Medhi,et al. A hierarchical model to evaluate quality of experience of online services hosted by cloud computing , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[14] Tushar Sharma,et al. Virtualization Techniques InCloud Computing , 2016 .