|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
EBOOKCENTRAL_ocn871224266 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
140301s2014 xx ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d E7B
|d DEBSZ
|d COO
|d OCLCO
|d OCLCQ
|d OCLCO
|d YDXCP
|d OCLCQ
|d RECBK
|d OCLCQ
|d COCUF
|d MOR
|d ZCU
|d MERUC
|d OCLCQ
|d U3W
|d STF
|d CEF
|d ICG
|d INT
|d VT2
|d OCLCQ
|d TKN
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 927408074
|
020 |
|
|
|a 9781118898765
|
020 |
|
|
|a 1118898761
|
020 |
|
|
|a 1848215991
|
020 |
|
|
|a 9781848215993
|
020 |
|
|
|z 9781848215993
|
029 |
1 |
|
|a AU@
|b 000055959739
|
029 |
1 |
|
|a CHNEW
|b 000886972
|
029 |
1 |
|
|a DEBBG
|b BV044066955
|
029 |
1 |
|
|a DEBSZ
|b 40566186X
|
029 |
1 |
|
|a DEBSZ
|b 425887596
|
029 |
1 |
|
|a DEBSZ
|b 431634874
|
029 |
1 |
|
|a DEBSZ
|b 449416321
|
035 |
|
|
|a (OCoLC)871224266
|z (OCoLC)927408074
|
050 |
|
4 |
|a TK5105.88813
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Xiong, Kaiqi.
|
245 |
1 |
0 |
|a Resource Optimization and Security for Cloud Services.
|
260 |
|
|
|a Hoboken :
|b Wiley,
|c 2014.
|
300 |
|
|
|a 1 online resource (208 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a ISTE
|
505 |
0 |
|
|a Cover; Title Page; Contents; Preface; Chapter 1. Introduction; 1.1. Motivation; 1.2. The problems; 1.3. Summary of contributions; 1.4. The organization of this book; Chapter 2. Current Approaches for Resource Optimization and Security; 2.1. Service availability; 2.2. Trustworthiness; 2.3. Performance; 2.4. The resource optimization problem subject to an SLA; 2.5. Public-key cryptography-based authentication; Chapter 3. Single Class Customers; 3.1. The percentile of response time; 3.2. A resource optimization problem for service models with single-class customers.
|
505 |
8 |
|
|a 3.3. Approaches for the resource optimization3.4. Numerical validations; 3.5. The balanced condition; 3.6. Services Performance Modeling and Analysis in a Simple Scenario of Cloud Computing; 3.6.1. Overview; 3.6.2. A computer service performance model; 3.6.3. A numerical validation; 3.6.4. Discussions; 3.7. Concluding remarks; Chapter 4. Multiple-Class Customers; 4.1. The SLA performance metric in the case of multiple class customers; 4.2. The resource optimization problem for multiple customer services; 4.2.1. Resource optimization problem for multiple class customers.
|
505 |
8 |
|
|a 4.3. Approaches for resource optimization4.3.1. The LSTs of response time distributions for two priority customers; 4.3.2. Algorithms for the resource optimization problem; 4.4. Numerical validations; 4.5. Concluding remarks; Chapter 5. A Trustworthy Service Model; 5.1. The trust-based resource optimization problem; 5.2. A framework for solving the trust-based resource provisioning problem; 5.3. The calculation of SLA metrics; 5.3.1. The trustworthiness of resource sites; 5.3.2. The percentile response time; 5.3.3. The service availability.
|
505 |
8 |
|
|a 5.4. An approach for solving the trust-based resource provisioning problem5.4.1. Single-class customers; 5.4.2. Multiple priority customers; 5.5. Numerical examples; 5.5.1. Single-class customers; 5.5.2. Multiple priority customers; 5.6. Concluding remarks; Chapter 6. Performance Analysis of Public-Key Cryptography-Based Group Authentication; 6.1. Public-key cryptography-based authentication; 6.2. PKCROSS and PKTAPP; 6.2.1. Protocol analysis; 6.2.2. The calculation of the response time via queuing networks; 6.3. A new group authentication technique using public-key cryptography.
|
505 |
8 |
|
|a 6.3.1. A single remote realm6.3.2. Multiple remote realms; 6.4. Performance evaluation of the new proposed technique; 6.4.1. The operations of encryption and decryption; 6.4.2. The calculation of the response time via a queuing network; 6.4.3. Discussions; 6.5. Concluding remarks; Chapter 7. Summary and Future Work; 7.1. Research summary of the book; 7.2. Future research directions; Bibliography; Index.
|
520 |
|
|
|a This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution i.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Cloud computing
|x Security measures
|2 fast
|
758 |
|
|
|i has work:
|a Resource optimization and security for cloud services (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCH8CkqJRPdTqmwKwkkv9wC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Xiong, Kaiqi.
|t Resource Optimization and Security for Cloud Services.
|d Hoboken : Wiley, ©2014
|z 9781848215993
|
830 |
|
0 |
|a ISTE.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1638159
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1638159
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10842274
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00436399
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12673578
|
994 |
|
|
|a 92
|b IZTAP
|