|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1039313684 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
180530s2018 nju ob 001 0 eng |
010 |
|
|
|a 2018026247
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d OCLCO
|d OCLCF
|d N$T
|d EBLCP
|d YDX
|d AAA
|d UKMGB
|d U3W
|d COO
|d OCLCQ
|d SFB
|d VT2
|d UKAHL
|d LUN
|d UMI
|d IEEEE
|d TAC
|d OCLCQ
|d OCLCO
|d IEEEE
|d OCLCQ
|d OCLCO
|
066 |
|
|
|c (S
|
016 |
7 |
|
|a 018904844
|2 Uk
|
019 |
|
|
|a 1048255283
|a 1049595117
|a 1124437250
|a 1156352796
|a 1171135517
|a 1197626828
|a 1233043065
|a 1266652060
|a 1302698787
|a 1355685133
|
020 |
|
|
|a 9781119428480
|q (electronic bk.)
|
020 |
|
|
|a 1119428483
|q (electronic bk.)
|
020 |
|
|
|a 1119428505
|
020 |
|
|
|a 9781119428503
|
020 |
|
|
|a 9781119428497
|q (electronic)
|
020 |
|
|
|a 1119428491
|
020 |
|
|
|z 9781119428633
|
020 |
|
|
|z 1119428637
|
024 |
8 |
|
|a 9781119428633
|
024 |
7 |
|
|a 10.1002/9781119428497
|2 doi
|
029 |
1 |
|
|a CHVBK
|b 529703858
|
029 |
1 |
|
|a CHNEW
|b 001021068
|
029 |
1 |
|
|a UKMGB
|b 018904844
|
029 |
1 |
|
|a AU@
|b 000067074329
|
029 |
1 |
|
|a AU@
|b 000067107971
|
035 |
|
|
|a (OCoLC)1039313684
|z (OCoLC)1048255283
|z (OCoLC)1049595117
|z (OCoLC)1124437250
|z (OCoLC)1156352796
|z (OCoLC)1171135517
|z (OCoLC)1197626828
|z (OCoLC)1233043065
|z (OCoLC)1266652060
|z (OCoLC)1302698787
|z (OCoLC)1355685133
|
037 |
|
|
|a 9781119428480
|b Wiley
|
037 |
|
|
|a 8591863
|b IEEE
|
050 |
|
4 |
|a QA76.585
|b .A87 2018eb
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.67/82
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Assured cloud computing /
|c edited by Roy H. Campbell, Charles A. Kamhoua, Kevin A. Kwiat.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Hoboken, NJ :
|b IEEE Computer Society, Inc./Wiley,
|c 2018.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Explores themes that drive individual contributions, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance - Synthesizes highly cited earlier work (on topics including DARE, trust mechanisms, and elastic graphs) as well as newer research findings on topics including R-Storm, and RAMP transactions - Addresses assured cloud computing concerns such as game theory, stream processing, storage, algorithms, workflow, scheduling, access control, formal analysis of safety, and streaming Marketing Description: IEEE Computer Society, the IEEE Reliability Society, and the IEEE Systems, Man, and Cybernetics Society--
|c Provided by publisher.
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed August 14, 2018).
|
505 |
0 |
|
|6 880-01
|a Assured Cloud Computing; Table of Contents; Preface; Editors' Biographies; List of Contributors; Chapter 1: Introduction; 1.1 Introduction; 1.1.1 Mission-Critical Cloud Solutions for the Military; 1.2 Overview of the Book; References; Chapter 2: Survivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using Maude; 2.1 Introduction; 2.1.1 State of the Art; 2.1.2 Vision: Formal Methods for Cloud Storage Systems; 2.1.3 The Rewriting Logic Framework; 2.1.4 Summary: Using Formal Methods on Cloud Storage Systems; 2.2 Apache Cassandra.
|
505 |
8 |
|
|a 2.3 Formalizing, Analyzing, and Extending Google's Megastore2.3.1 Specifying Megastore; 2.3.2 Analyzing Megastore; 2.3.2.1 Megastore-CGC; 2.4 RAMP Transaction Systems; 2.5 Group Key Management via ZooKeeper; 2.5.1 Zookeeper Background; 2.5.2 System Design; 2.5.3 Maude Model; 2.5.4 Analysis and Discussion; 2.6 How Amazon Web Services Uses Formal Methods; 2.6.1 Use of Formal Methods; 2.6.2 Outcomes and Experiences; 2.6.3 Limitations; 2.7 Related Work; 2.8 Concluding Remarks; 2.8.1 The Future; Acknowledgments; References.
|
505 |
8 |
|
|a 4.5.1 Hypervisor Introspection4.5.1.1 VMI Monitor; 4.5.1.2 VM Suspend Side-Channel; 4.5.1.3 Limitations of Hypervisor Introspection; 4.5.2 Evading VMI with Hypervisor Introspection; 4.5.2.1 Insider Attack Model and Assumptions; 4.5.2.2 Large File Transfer; 4.5.3 Defenses against Hypervisor Introspection; 4.5.3.1 Introducing Noise to VM Clocks; 4.5.3.2 Scheduler-Based Defenses; 4.5.3.3 Randomized Monitoring Interval; 4.5.4 Summary; 4.6 Identifying Compromised Users in Shared Computing Infrastructures; 4.6.1 Target System and Security Data; 4.6.1.1 Data and Alerts.
|
542 |
|
|
|f Copyright © 2018 by John Wiley & Sons
|g 2018
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Cloud computing
|2 fast
|
700 |
1 |
|
|a Campbell, Roy Harold,
|e editor.
|
700 |
1 |
|
|a Kamhoua, Charles A.,
|e editor.
|
700 |
1 |
|
|a Kwiat, Kevin A.,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Assured cloud computing.
|b First edition.
|d Hoboken, NJ : IEEE Computer Society, Inc./Wiley, 2018
|z 1119428637
|z 9781119428633
|w (OCoLC)1005118106
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119428633/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
880 |
8 |
|
|6 505-01/(S
|a Chapter 3: Risks and Benefits: Game-Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud3.1 Introduction; 3.2 Vision: Using Cloud Technology in Missions; 3.3 State of the Art; 3.4 System Model; 3.5 Game Model; 3.6 Game Analysis; 3.7 Model Extension and Discussion; 3.8 Numerical Results and Analysis; 3.8.1 Changes in User 2's Payoff with Respect to L2; 3.8.2 Changes in User 2's Payoff with Respect to e; 3.8.3 Changes in User 2's Payoff with Respect to π; 3.8.4 Changes in User 2's Payoff with Respect to qI; 3.8.5 Model Extension to = 10 Users; 3.9 The Future.
|
938 |
|
|
|a IEEE
|b IEEE
|n 8591863
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15964221
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5489411
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1866547
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15634629
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33508025
|
994 |
|
|
|a 92
|b IZTAP
|