رکورد قبلیرکورد بعدی

" Assured cloud computing / "


Document Type : BL
Record Number : 840348
Title & Author : Assured cloud computing /\ edited by Roy H. Campbell, Charles A. Kamhoua, Kevin A. Kwiat.
Edition Statement : First edition.
Publication Statement : Hoboken, NJ :: IEEE Computer Society, Inc./Wiley,, 2018.
Page. NO : 1 online resource
ISBN : 1119428483
: : 1119428505
: : 9781119428480
: : 9781119428503
: 1119428637
: 9781119428503
: 9781119428633
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Assured Cloud Computing; Table of Contents; Preface; Editors' Biographies; List of Contributors; Chapter 1: Introduction; 1.1 Introduction; 1.1.1 Mission-Critical Cloud Solutions for the Military; 1.2 Overview of the Book; References; Chapter 2: Survivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using Maude; 2.1 Introduction; 2.1.1 State of the Art; 2.1.2 Vision: Formal Methods for Cloud Storage Systems; 2.1.3 The Rewriting Logic Framework; 2.1.4 Summary: Using Formal Methods on Cloud Storage Systems; 2.2 Apache Cassandra.
: 2.3 Formalizing, Analyzing, and Extending Google's Megastore2.3.1 Specifying Megastore; 2.3.2 Analyzing Megastore; 2.3.2.1 Megastore-CGC; 2.4 RAMP Transaction Systems; 2.5 Group Key Management via ZooKeeper; 2.5.1 Zookeeper Background; 2.5.2 System Design; 2.5.3 Maude Model; 2.5.4 Analysis and Discussion; 2.6 How Amazon Web Services Uses Formal Methods; 2.6.1 Use of Formal Methods; 2.6.2 Outcomes and Experiences; 2.6.3 Limitations; 2.7 Related Work; 2.8 Concluding Remarks; 2.8.1 The Future; Acknowledgments; References.
: 4.5.1 Hypervisor Introspection4.5.1.1 VMI Monitor; 4.5.1.2 VM Suspend Side-Channel; 4.5.1.3 Limitations of Hypervisor Introspection; 4.5.2 Evading VMI with Hypervisor Introspection; 4.5.2.1 Insider Attack Model and Assumptions; 4.5.2.2 Large File Transfer; 4.5.3 Defenses against Hypervisor Introspection; 4.5.3.1 Introducing Noise to VM Clocks; 4.5.3.2 Scheduler-Based Defenses; 4.5.3.3 Randomized Monitoring Interval; 4.5.4 Summary; 4.6 Identifying Compromised Users in Shared Computing Infrastructures; 4.6.1 Target System and Security Data; 4.6.1.1 Data and Alerts.
Abstract : Explores themes that drive individual contributions, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance - Synthesizes highly cited earlier work (on topics including DARE, trust mechanisms, and elastic graphs) as well as newer research findings on topics including R-Storm, and RAMP transactions - Addresses assured cloud computing concerns such as game theory, stream processing, storage, algorithms, workflow, scheduling, access control, formal analysis of safety, and streaming Marketing Description: IEEE Computer Society, the IEEE Reliability Society, and the IEEE Systems, Man, and Cybernetics Society--
Subject : Cloud computing.
Subject : Cloud computing.
Subject : COMPUTERS-- Computer Literacy.
Subject : COMPUTERS-- Computer Science.
Subject : COMPUTERS-- Data Processing.
Subject : COMPUTERS-- Hardware-- General.
Subject : COMPUTERS-- Information Technology.
Subject : COMPUTERS-- Machine Theory.
Subject : COMPUTERS-- Reference.
Dewey Classification : ‭004.67/82‬
LC Classification : ‭QA76.585‬‭.A87 2018eb‬
Added Entry : Campbell, Roy Harold
: Kamhoua, Charles A.
: Kwiat, Kevin A.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟