18 research outputs found

    From security to assurance in the cloud: a survey

    Get PDF
    The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and service providers) on a pay-as-you-go basis. Cloud tenants can use cloud resources at lower prices, and higher performance and flexibility, than traditional on-premises resources, without having to care about infrastructure management. Still, cloud tenants remain concerned with the cloud's level of service and the nonfunctional properties their applications can count on. In the last few years, the research community has been focusing on the nonfunctional aspects of the cloud paradigm, among which cloud security stands out. Several approaches to security have been described and summarized in general surveys on cloud security techniques. The survey in this article focuses on the interface between cloud security and cloud security assurance. First, we provide an overview of the state of the art on cloud security. Then, we introduce the notion of cloud security assurance and analyze its growing impact on cloud security approaches. Finally, we present some recommendations for the development of next-generation cloud security and assurance solutions

    BATON: A balanced tree structure for peer-to-peer networks

    No full text
    VLDB 2005 - Proceedings of 31st International Conference on Very Large Data Bases2661-67

    SiMPSON: Efficient similarity search in metric spaces over P2P structured overlay networks

    No full text
    10.1007/978-3-642-03869-3_48Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)5704 LNCS498-51

    Peer-to-peer computing: Principles and applications

    No full text
    10.1007/978-3-642-03514-2Peer-to-Peer Computing: Principles and Applications1-31

    A Graph Method for Keyword-based Selection of the top-K Databases

    No full text
    10.1145/1376616.1376707Proceedings of the ACM SIGMOD International Conference on Management of Data915-92

    On the management of cloud non-functional properties : the cloud transparency toolkit

    No full text
    The cloud computing paradigm supports a vision of IT where virtual resources are distributed as commodities on either a subscription or a pay-per-use price model, without the need for any upfront investment in hardware or software assets for its tenants (i.e., customers and service providers). Since these resources, as well as data and applications moved to the cloud, are no longer directly controlled by their owners under tenancy, there is an increasing need for new solutions that reduce the uncertainty of tenants about the status of their data and applications in the cloud. In this paper, we present the architecture of the Cloud Transparency Toolkit (CTT), whose goal is to provide a general purpose and interoperable approach that increases the transparency of the cloud, improving the effectiveness of non-functional property verification and management

    Content-based search using term aggregation and classification over hybrid peer-to-peer systems

    No full text
    10.1109/ICNPCW.2007.4351456Proceedings - 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 200728-3

    Adaptive multi-join query processing in PDBMS

    No full text
    10.1109/ICDE.2009.210Proceedings - International Conference on Data Engineering1239-124

    Fatigue life modelling under variable amplitude multiaxial loading: Comparison between fatigue criterion and incremental modelling

    No full text
    International audienceThis study deals with fatigue of a 1045 carbon steel subjected to a cyclic tension-torsion spectrum combining in-phase and out-of-phase loadings and including overload, representative of an automotive chassis loading type. The experimental lifetimes are compared to the results of two different approaches. The first one combines a multiaxial fatigue criterion able to describe out of phase loading and a non-linear damage rule. The second one is based on an incremental mesoscale plasticity/damage model. It is shown that the criterion involving a non-linear damage rule is able to describe the experimental result for full spectrum (with overload) but the identification of the non-linearity is a function of spectrum type. The incremental approach gives better results for both spectra (with and without overloads) and does not need specific parameter identification

    Skyframe: A framework for skyline query processing in peer-to-peer systems

    No full text
    10.1007/s00778-008-0104-3VLDB Journal181345-36
    corecore