Thông tin tài liệu
i hc Công ngh
ngành: ; 60 48 10
PGS.TS.
2011
Abstract:
Keywords: ; ; Microsoft azure;
Content
Cì nó
.
. ,
,
-
,
,
.
,
,
.
,
,
.
,
.
.
2
vào.
các tài nguyên tính toán.
nay có
Nam.
3
-các
mây.
References
[1] Announcing the Advanced Encryption Standard (AES)
[2] CFengine (2009) http://www.cfengine.org/
[3] Buco MJ et al (2004, Jan) Utility computing SLA management based upon business
objectives. IBM Syst J 43(1):159178
[4] David Chappel (2009), Introducing Windows Azure
[5] David S Linthcum , Praise for Cloud Computing and SOA Convergence in Your
Enterprise
[6] David Chappel (2009), Introducing Windows Azure
[7] David S Linthcum , Praise for Cloud Computing and SOA Convergence in Your
Enterprise
[8] Dominic Betts, Scott Densmore, Ryan Dunn, Masashi Narumoto, Eugenio Pace , Moving
Application to Cloud on the Microsoft Windows Azure
[9] GoGrid’s prepaid cloud hosting plans (2009). http://www.gogrid.com/pricing/plans.php
[10] Henry Li (2009), Introduction to Windows Azure
[11] Hongwei Li, Yuanshun Dai , Bo Yang , Identity-Based Cryptography for Cloud Security
[12]
http://www.microsoft.com/windowsazure/Whitepapers/introducingwindowsazureplatfor
m/
[13] http://msdn.microsoft.com/en-us/library/ee922714.aspx
[14] http://msdn.microsoft.com/en-us/library/dd179346.aspx
[15] Liang Yan, Chunming Rong, and Gansen Zhao , Strengthen Cloud Computing Security
with Federal Identity Management Using Hierarchical Identity-Based Cryptography
[16] Nick Antonopoulos (2010), Computer Communications and Networks
[17] P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. Ben Othmane, L. Lilien, and M.
Linderman, “A User-Centric Approach for Privacy and Identity Management in Cloud
Computing,” Proc. 29th IEEE Intl. Symp. on Reliable Distributed Systems (SRDS), New
Delhi , India, Nov. 2010.
[18] OASIS (Organization for the Advancement of Structured Information Standards) (2009)
http://www.oasis-open.org/
[19] Ristenpart T et al (2009) Hey, you, get off of my cloud: exploring information
leakage in third-party compute clouds. Proceeding of ACM conference on computer and
communications security
4
[20] Robert Elsenpeter Ph.D, Velte Toby J. Velte(2010) Cloud Computing: A Practical
Approach
[21] Robin Bloor, Marcia Kaufman, and Dr. Fern Halper (2010), Cloud Computing for
dummies Judith Hurwitz
[22] rPath (2009) http://www.rpath.com
[23] Sheehan M (2009) Message from GoGrid founders regarding denial of service
attack. Retrieved from, GoGrid Official Blog, http://blog.gogrid.com/
[24] Tejaswi Redkar (2009), Windows Azure Platform
[25] Sriram Krishnan (May 2010), Programming Windows Azure
. Windows Azure
[11] Hongwei Li, Yuanshun Dai , Bo Yang , Identity-Based Cryptography for Cloud Security
[12]
http://www .microsoft. com/windowsazure/Whitepapers/introducingwindowsazureplatfor
m/.
http://www .microsoft. com/windowsazure/Whitepapers/introducingwindowsazureplatfor
m/
[13] http://msdn .microsoft. com/en-us/library/ee922714.aspx
[14] http://msdn .microsoft. com/en-us/library/dd179346.aspx
Ngày đăng: 19/03/2014, 18:20
Xem thêm: Báo cáo " Nghiên cứu nguyên lý, kiến trúc điện toán đám mây và xây dựng phần mềm quản lý nguồn lực trên nền tảng Microsoft Azure " pptx, Báo cáo " Nghiên cứu nguyên lý, kiến trúc điện toán đám mây và xây dựng phần mềm quản lý nguồn lực trên nền tảng Microsoft Azure " pptx