Cargando…

Assured cloud computing /

Explores themes that drive individual contributions, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance - Synthesizes highly cited earlier work (on topics including DARE, trust mechanisms, and elastic graphs) as well as...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Campbell, Roy Harold (Editor ), Kamhoua, Charles A. (Editor ), Kwiat, Kevin A. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : IEEE Computer Society, Inc./Wiley, 2018.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1039313684
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 180530s2018 nju ob 001 0 eng
010 |a  2018026247 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d OCLCO  |d OCLCF  |d N$T  |d EBLCP  |d YDX  |d AAA  |d UKMGB  |d U3W  |d COO  |d OCLCQ  |d SFB  |d VT2  |d UKAHL  |d LUN  |d UMI  |d IEEEE  |d TAC  |d OCLCQ  |d OCLCO  |d IEEEE  |d OCLCQ  |d OCLCO 
066 |c (S 
016 7 |a 018904844  |2 Uk 
019 |a 1048255283  |a 1049595117  |a 1124437250  |a 1156352796  |a 1171135517  |a 1197626828  |a 1233043065  |a 1266652060  |a 1302698787  |a 1355685133 
020 |a 9781119428480  |q (electronic bk.) 
020 |a 1119428483  |q (electronic bk.) 
020 |a 1119428505 
020 |a 9781119428503 
020 |a 9781119428497  |q (electronic) 
020 |a 1119428491 
020 |z 9781119428633 
020 |z 1119428637 
024 8 |a 9781119428633 
024 7 |a 10.1002/9781119428497  |2 doi 
029 1 |a CHVBK  |b 529703858 
029 1 |a CHNEW  |b 001021068 
029 1 |a UKMGB  |b 018904844 
029 1 |a AU@  |b 000067074329 
029 1 |a AU@  |b 000067107971 
035 |a (OCoLC)1039313684  |z (OCoLC)1048255283  |z (OCoLC)1049595117  |z (OCoLC)1124437250  |z (OCoLC)1156352796  |z (OCoLC)1171135517  |z (OCoLC)1197626828  |z (OCoLC)1233043065  |z (OCoLC)1266652060  |z (OCoLC)1302698787  |z (OCoLC)1355685133 
037 |a 9781119428480  |b Wiley 
037 |a 8591863  |b IEEE 
050 4 |a QA76.585  |b .A87 2018eb 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.67/82  |2 23 
049 |a UAMI 
245 0 0 |a Assured cloud computing /  |c edited by Roy H. Campbell, Charles A. Kamhoua, Kevin A. Kwiat. 
250 |a First edition. 
264 1 |a Hoboken, NJ :  |b IEEE Computer Society, Inc./Wiley,  |c 2018. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references and index. 
520 |a Explores themes that drive individual contributions, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance - Synthesizes highly cited earlier work (on topics including DARE, trust mechanisms, and elastic graphs) as well as newer research findings on topics including R-Storm, and RAMP transactions - Addresses assured cloud computing concerns such as game theory, stream processing, storage, algorithms, workflow, scheduling, access control, formal analysis of safety, and streaming Marketing Description: IEEE Computer Society, the IEEE Reliability Society, and the IEEE Systems, Man, and Cybernetics Society--  |c Provided by publisher. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed August 14, 2018). 
505 0 |6 880-01  |a Assured Cloud Computing; Table of Contents; Preface; Editors' Biographies; List of Contributors; Chapter 1: Introduction; 1.1 Introduction; 1.1.1 Mission-Critical Cloud Solutions for the Military; 1.2 Overview of the Book; References; Chapter 2: Survivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using Maude; 2.1 Introduction; 2.1.1 State of the Art; 2.1.2 Vision: Formal Methods for Cloud Storage Systems; 2.1.3 The Rewriting Logic Framework; 2.1.4 Summary: Using Formal Methods on Cloud Storage Systems; 2.2 Apache Cassandra. 
505 8 |a 2.3 Formalizing, Analyzing, and Extending Google's Megastore2.3.1 Specifying Megastore; 2.3.2 Analyzing Megastore; 2.3.2.1 Megastore-CGC; 2.4 RAMP Transaction Systems; 2.5 Group Key Management via ZooKeeper; 2.5.1 Zookeeper Background; 2.5.2 System Design; 2.5.3 Maude Model; 2.5.4 Analysis and Discussion; 2.6 How Amazon Web Services Uses Formal Methods; 2.6.1 Use of Formal Methods; 2.6.2 Outcomes and Experiences; 2.6.3 Limitations; 2.7 Related Work; 2.8 Concluding Remarks; 2.8.1 The Future; Acknowledgments; References. 
505 8 |a 4.5.1 Hypervisor Introspection4.5.1.1 VMI Monitor; 4.5.1.2 VM Suspend Side-Channel; 4.5.1.3 Limitations of Hypervisor Introspection; 4.5.2 Evading VMI with Hypervisor Introspection; 4.5.2.1 Insider Attack Model and Assumptions; 4.5.2.2 Large File Transfer; 4.5.3 Defenses against Hypervisor Introspection; 4.5.3.1 Introducing Noise to VM Clocks; 4.5.3.2 Scheduler-Based Defenses; 4.5.3.3 Randomized Monitoring Interval; 4.5.4 Summary; 4.6 Identifying Compromised Users in Shared Computing Infrastructures; 4.6.1 Target System and Security Data; 4.6.1.1 Data and Alerts. 
542 |f Copyright © 2018 by John Wiley & Sons  |g 2018 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cloud computing. 
650 6 |a Infonuagique. 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Cloud computing  |2 fast 
700 1 |a Campbell, Roy Harold,  |e editor. 
700 1 |a Kamhoua, Charles A.,  |e editor. 
700 1 |a Kwiat, Kevin A.,  |e editor. 
776 0 8 |i Print version:  |t Assured cloud computing.  |b First edition.  |d Hoboken, NJ : IEEE Computer Society, Inc./Wiley, 2018  |z 1119428637  |z 9781119428633  |w (OCoLC)1005118106 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119428633/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
880 8 |6 505-01/(S  |a Chapter 3: Risks and Benefits: Game-Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud3.1 Introduction; 3.2 Vision: Using Cloud Technology in Missions; 3.3 State of the Art; 3.4 System Model; 3.5 Game Model; 3.6 Game Analysis; 3.7 Model Extension and Discussion; 3.8 Numerical Results and Analysis; 3.8.1 Changes in User 2's Payoff with Respect to L2; 3.8.2 Changes in User 2's Payoff with Respect to e; 3.8.3 Changes in User 2's Payoff with Respect to π; 3.8.4 Changes in User 2's Payoff with Respect to qI; 3.8.5 Model Extension to = 10 Users; 3.9 The Future. 
938 |a IEEE  |b IEEE  |n 8591863 
938 |a YBP Library Services  |b YANK  |n 15964221 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5489411 
938 |a EBSCOhost  |b EBSC  |n 1866547 
938 |a YBP Library Services  |b YANK  |n 15634629 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33508025 
994 |a 92  |b IZTAP