D Radovanovic - 2012
... OpenLink Software develops, deploys, and supports bleeding edge technology covering the following realms: 1. Relational Database Connectivity Middleware — ODBC, JDBC, ADO.NET, OLE-DB, and XMLA Drivers/Providers 2. Disparate Data Virtualization 3. Personal &
A combined approach to ensure data security in cloud computing
SK Sood - Journal of Network and Computer Applications, 2012
... the remote database. Computers in the cloud are configured to work simultaneously and the various applications use the collective computing power as if they are running on a cloud using the concept of virtualization.
A Study on Security Threats in Cloud
N Jeyanthi, H Shabeeb… - … Journal of Cloud Computing and Services …, 2012
... Abstract. Cloud computing is now invading almost all IT industry and has become a rich area of research. It enables the users to share the resources which are done through resource virtualization and they have to pay only for what they use.
Cloud Service Utilization
P Chauhan - International Journal of Advanced Research in …, 2012
... At various domains and how these domain mainly get affected by the cloud. Keywords Virtualization, Storage, Compute, Security. References. .http://india.emc.com/microsites/cloud/ cloud.htm?pid=home-small-cloudtransformsit-230212. . Amazon Elastic Compute Cloud (EC2):
Research on Key Technologies for Internet of Things
GL Shi… - Applied Mechanics and Materials, 2012
... The key technology for cloud computing is the virtualization technology. A single server can support multiple virtual machines to run multiple operating systems to improve the utilization of the server through the virtualization technology
An Initial Approach to Provide Security in Cloud Network
S Srinivasu, KPRK Chaitanya… - International Journal of Advanced …, 2012
... VirtualMachines:Virtualizationvs.Emulation: http://www.griffincaprio.com/blog/2006/08/virtual- machines-virtualization-vs-emulation.html. OperatingSystem: http://www.computerhope.com/os.htm. https://cloudsecurityalliance.org/research/ccm/(Cloud Control Matrix). Full Text: PDF. ...
Energy-Efficient Thermal-Aware Autonomic Management of Virtualized HPC Cloud Infrastructure
I Rodero, H Viswanathan, EK Lee, M Gamell… - Journal of Grid Computing, 2012
... Keywords Cloud infrastructure · Virtualization · Thermal management · Energy-efficiency ... This co-location minimizes the usual adverse effects of resource contention and virtualization overhead on application per- formance while retaining the benefits of server consolidation.
Building trust into cloud
FAN Wenjuan, Y Shanlin, PEI Jun… - International Journal of Cloud Computing …, 2012
... Joshua S. et al. Seeding Clouds with Trust Anchors, In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pp. 43-46, 2010. Flavio L. and Roberto DP Secure virtualization for cloud computing. Journal of Network and Applications, vol. 34, no.
[PDF] Homomorphic Encryption Applied to the Cloud Computing Security
M TEBAA, S EL HAJJI… - Lecture Notes in Engineering and Computer …, 2012
... provider). Cloud providers such as IBM, Google and Amazon use the virtualization on their Cloud platform and on the same server can coexist a virtualized storage and treatment space that belong to concurrent enterprises.
No comments:
Post a Comment