Thursday, April 7, 2016

Research Readings in Cloud

Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization.

O MJIHIL, DS Kim, A HAQIQ - Journal of Information Assurance & Security, 2016

Managing sensitive applications in the public cloud

KA Beaty, JM Chow, RLF Cunha, KK Das, MF Hulber… - IBM Journal of Research …, 2016
... platform for industry-transforming solutions. In this paper, we use the term “public cloud”
to refer to a form of cloud computing in which a company relies on a third-party cloud
service provider for services. This kind of cloud provides ...

Managed infrastructure with IBM Cloud OpenStack Services

S Cash, V Jain, L Jiang, A Karve, J Kidambi, M Lyons… - IBM Journal of Research …, 2016
Page 1. Managed infrastructure with IBM Cloud OpenStack Services S. Cash V. Jain
L. Jiang A. Karve J. Kidambi M. Lyons T. Mathews S. Mullen M. Mulsow N. Patel
In this paper, we discuss how OpenStack®, an open source ...

Auditing a Cloud Provider's Compliance with Data Backup Requirements: A Game Theoretical Analysis

Z Ismail, C Kiennert, J Leneutre, L Chen - 2016
Page 1. 1556-6013 (c) 2015 IEEE. Personal use is permitted, but republication/
redistribution requires IEEE permission. See http://www.ieee.org/
publications_standards/publications/rights/index.html for more information. This ...

Comparison between multi-class classifiers and deep learning with focus on industry 4.0

M Mi, I Zolotov - 2016 Cybernetics & Informatics (K&I), 2016
... technologies can further intertwine intelligent algorithms with electronics and tether-free
intelligence to predict product performance degradation and autonomously manage and optimize
product service needs [4]. A relatively new thought is cloud computing in industrial systems ...

Adaptive 3D to 2D projection for different height slices and extraction of robust morphological features for 3D object recognition

H Chen, Y Owechko - US Patent 9,286,538, 2016
... retrieved from an online data storage unit such as in “Cloud” computingIn an aspect,
the computer system 1100 also may include one or more interfaces, such as an
interface 11110, coupled with the address/data bus 1102. ...

Cryptographic key escrow

GB Roth, GD Baer - US Patent 9,288,208, 2016
... Cloud computingin general, is an approach to providing access to electronic resources through
services, such as Web services, where the hardware and/or software used to support those
services are dynamically scalable to meet the needs of the services at any given time. ...

Managing Information Display

HS Raffle, MP Johnson, A Chandel, CYF Li - US Patent 20,160,077,337, 2016
An example method includes receiving, by a head-mountable device (HMD),
data corresponding to an information event, and providing an indication
corresponding to the information event in response to re.

[PDF] The Cloud Computing: the impact of regulation on adoption

K EL AGUEZ, M Rabat, N HAJJI, H BARKA
... Operators experiencing a drastic decline in their turnover, due to strong competition
in the mobile segment, must integrate cloud computing in their future strategies to
capture a share of the profits of this new growth opportunity. ...

[PDF] Towards Foundational Verification of Cyber-physical Systems

G Malecha, D Ricketts, MM Alvarez, S Lerner
... [Online]. Available: http://gallium.inria.fr/xleroy/publi/compcert-CACM.pdf [44] L. Gu, A. Vaynberg,
B. Ford, Z. Shao, and D. Costanzo, “Certikos: A certified kernel for secure cloud computing,” in
Proceedings of the Second Asia-Pacific Workshop on Systems, ser. APSys '11. ...

No comments:

Post a Comment

 

blogger templates 3 columns | Make Money Online