|
" Assured cloud computing / "
edited by Roy H. Campbell, Charles A. Kamhoua, Kevin A. Kwiat.
Document Type
|
:
|
BL
|
Record Number
|
:
|
840348
|
Title & Author
|
:
|
Assured cloud computing /\ edited by Roy H. Campbell, Charles A. Kamhoua, Kevin A. Kwiat.
|
Edition Statement
|
:
|
First edition.
|
Publication Statement
|
:
|
Hoboken, NJ :: IEEE Computer Society, Inc./Wiley,, 2018.
|
Page. NO
|
:
|
1 online resource
|
ISBN
|
:
|
1119428483
|
|
:
|
: 1119428505
|
|
:
|
: 9781119428480
|
|
:
|
: 9781119428503
|
|
:
|
1119428637
|
|
:
|
9781119428503
|
|
:
|
9781119428633
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
Assured Cloud Computing; Table of Contents; Preface; Editors' Biographies; List of Contributors; Chapter 1: Introduction; 1.1 Introduction; 1.1.1 Mission-Critical Cloud Solutions for the Military; 1.2 Overview of the Book; References; Chapter 2: Survivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using Maude; 2.1 Introduction; 2.1.1 State of the Art; 2.1.2 Vision: Formal Methods for Cloud Storage Systems; 2.1.3 The Rewriting Logic Framework; 2.1.4 Summary: Using Formal Methods on Cloud Storage Systems; 2.2 Apache Cassandra.
|
|
:
|
2.3 Formalizing, Analyzing, and Extending Google's Megastore2.3.1 Specifying Megastore; 2.3.2 Analyzing Megastore; 2.3.2.1 Megastore-CGC; 2.4 RAMP Transaction Systems; 2.5 Group Key Management via ZooKeeper; 2.5.1 Zookeeper Background; 2.5.2 System Design; 2.5.3 Maude Model; 2.5.4 Analysis and Discussion; 2.6 How Amazon Web Services Uses Formal Methods; 2.6.1 Use of Formal Methods; 2.6.2 Outcomes and Experiences; 2.6.3 Limitations; 2.7 Related Work; 2.8 Concluding Remarks; 2.8.1 The Future; Acknowledgments; References.
|
|
:
|
4.5.1 Hypervisor Introspection4.5.1.1 VMI Monitor; 4.5.1.2 VM Suspend Side-Channel; 4.5.1.3 Limitations of Hypervisor Introspection; 4.5.2 Evading VMI with Hypervisor Introspection; 4.5.2.1 Insider Attack Model and Assumptions; 4.5.2.2 Large File Transfer; 4.5.3 Defenses against Hypervisor Introspection; 4.5.3.1 Introducing Noise to VM Clocks; 4.5.3.2 Scheduler-Based Defenses; 4.5.3.3 Randomized Monitoring Interval; 4.5.4 Summary; 4.6 Identifying Compromised Users in Shared Computing Infrastructures; 4.6.1 Target System and Security Data; 4.6.1.1 Data and Alerts.
|
Abstract
|
:
|
Explores themes that drive individual contributions, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance - Synthesizes highly cited earlier work (on topics including DARE, trust mechanisms, and elastic graphs) as well as newer research findings on topics including R-Storm, and RAMP transactions - Addresses assured cloud computing concerns such as game theory, stream processing, storage, algorithms, workflow, scheduling, access control, formal analysis of safety, and streaming Marketing Description: IEEE Computer Society, the IEEE Reliability Society, and the IEEE Systems, Man, and Cybernetics Society--
|
Subject
|
:
|
Cloud computing.
|
Subject
|
:
|
Cloud computing.
|
Subject
|
:
|
COMPUTERS-- Computer Literacy.
|
Subject
|
:
|
COMPUTERS-- Computer Science.
|
Subject
|
:
|
COMPUTERS-- Data Processing.
|
Subject
|
:
|
COMPUTERS-- Hardware-- General.
|
Subject
|
:
|
COMPUTERS-- Information Technology.
|
Subject
|
:
|
COMPUTERS-- Machine Theory.
|
Subject
|
:
|
COMPUTERS-- Reference.
|
Dewey Classification
|
:
|
004.67/82
|
LC Classification
|
:
|
QA76.585.A87 2018eb
|
Added Entry
|
:
|
Campbell, Roy Harold
|
|
:
|
Kamhoua, Charles A.
|
|
:
|
Kwiat, Kevin A.
|
| |