+ All Categories
Home > Documents > CHAPTER 7 BIBLIOGRAPHY -...

CHAPTER 7 BIBLIOGRAPHY -...

Date post: 20-Mar-2020
Category:
Author: others
View: 3 times
Download: 0 times
Share this document with a friend
Embed Size (px)
of 28 /28
Chapter 7 Bibliography 234 CHAPTER 7 BIBLIOGRAPHY [1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds : A Berkeley View of Cloud Computing, 2009. [2] “Microsoft Windows Azure” http://www.microsoft.com/windowsazure/. [3] “Google App Engine” http://code.google.com/appengine/. [4] I. Foster and C. Kesselman, “The grid: blueprint for a new computing infrastructure,” Oct. 1998. [5] S. Clearwater, Market-Based Control: A Paradigm for Distributed Resource Allocation, World Scientific, 1996. [6] J. Shneidman, C. Ng, D.C. Parkes, A. AuWeng, A.C. Snoeren, A. Vahdat, and B. Chun, “Why Markets Could (But Don’t Currently) Solve Resource Allocation Problems in Systems,” Challenges, 2005, p. 7. [7] P. Cramton, Y. Shoham, and R. Steinberg, Combinatorial Auctions, The MIT Press, 2005. [8] A. Das and D. Grosu, “Combinatorial auction-based protocols for resource allocation in grids,” Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International, 2005. [9] A. Marshall, Principles of Economics (Great Minds Series), Prometheus Books, 1997.
Transcript
  • Chapter 7 Bibliography 234

    CHAPTER 7

    BIBLIOGRAPHY

    [1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee,

    D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds : A Berkeley

    View of Cloud Computing, 2009.

    [2] “Microsoft Windows Azure” http://www.microsoft.com/windowsazure/.

    [3] “Google App Engine” http://code.google.com/appengine/.

    [4] I. Foster and C. Kesselman, “The grid: blueprint for a new computing

    infrastructure,” Oct. 1998.

    [5] S. Clearwater, Market-Based Control: A Paradigm for Distributed Resource

    Allocation, World Scientific, 1996.

    [6] J. Shneidman, C. Ng, D.C. Parkes, A. AuWeng, A.C. Snoeren, A. Vahdat, and B.

    Chun, “Why Markets Could (But Don’t Currently) Solve Resource Allocation

    Problems in Systems,” Challenges, 2005, p. 7.

    [7] P. Cramton, Y. Shoham, and R. Steinberg, Combinatorial Auctions, The MIT

    Press, 2005.

    [8] A. Das and D. Grosu, “Combinatorial auction-based protocols for resource

    allocation in grids,” Parallel and Distributed Processing Symposium, 2005.

    Proceedings. 19th IEEE International, 2005.

    [9] A. Marshall, Principles of Economics (Great Minds Series), Prometheus Books,

    1997.

  • Chapter 7 Bibliography 235

    [10] “Market,” From Wikipedia, the free encyclopedia

    http://en.wikipedia.org/wiki/Market.113

    [11] D. Friedman, “The double auction market institution: A survey,” The Double

    Auction Market: Institutions, Theories, And Evidence, J. Rust, ed., Westview Press,

    1993, pp. 3-26.

    [12] R. Buyya, D. Abramson, J. Giddy, and H. Stockinger, “Economic models for

    resource management and scheduling in Grid computing,” Concurrency and

    Computation: Practice and Experience, vol. 14, 2002, pp. 1507-1542.

    [13] Y. Shoham and K. Leyton-Brown, Multiagent systems: Algorithmic, game-

    theoretic, and logical foundations, Cambridge Univ Pr, 2009.

    [14] D.S. Diamond and L.L. Selwyn, “Considerations for computer utility pricing

    policies,” Proceedings of the 1968 23rd ACM national conference, New York, New

    York, USA: ACM Press, 1968, pp. 189-200.

    [15] I.E. Sutherland, “A futures market in computer time,” Communications of the

    ACM, vol. 11, Jun. 1968, pp. 449-451.

    [16] R. Buyya, D. Abramson, and S. Venugopal, “The Grid Economy,” Proceeding of

    the IEEE, vol. 93, Mar. 2005, pp. 698-714.

    [17] C.S. Yeo and R. Buyya, “A taxonomy of market-based resource management

    systems for utility-driven cluster computing,” Software: Practice and Experience, vol.

    36, Nov. 2006, pp. 1381-1419.

    [18] R. Buyya and M. Murshed, “GridSim: a toolkit for the modeling and simulation

    of distributed resource management and scheduling for Grid computing,”

    Concurrency and Computation: Practice and Experience, vol. 14, Nov. 2002, pp.

    1175-1220.

  • Chapter 7 Bibliography 236

    [19] R. Buyya, R. Ranjan, and R.N. Calheiros, Modeling and simulation of scalable

    Cloud computing environments and the CloudSim toolkit: Challenges and

    opportunities, IEEE, 2009.

    [20] C.A. Waldspurger, T. Hogg, B.A. Huberman, J.O. Kephart, and W.S. Stornetta,

    “Spawn: A Distributed Computational Economy,” IEEE Transactions on Software

    Engineering, vol. 18, Feb. 1992, pp. 103-117.

    [21] N. Nisan, S. London, O. Regev, and N. Camiel, “Globally distributed

    computation over the Internet-the POPCORN project,” Proceedings. 18th.

    [22] Lewis, Grace. Cloud Computing: Finding the Silver Lining, Not the Silver

    Bullet. http://www.sei.cmu.edu/newsitems/cloudcomputing.cfm, 2009.

    [23] Dormann, Will & Rafail, Jason. Securing Our Web Browser.

    http://www.cert.org/tech_tips/securing_browser, 2006.

    [24] Jansen, Wayne & Grance, Timothy. Guidelines on Security and Privacy in Public

    Cloud Computing. National Institute of Standards and Technology, 2011.

    [25] Strowd, Harrison & Lewis, Grace. T-Check in System-of-Systems Technologies:

    Cloud Computing (CMU/SEI-2010-TN-009). Software Engineering Institute,

    Carnegie Mellon University, 2010. http: //www.sei.cmu.edu /library /abstracts /reports

    /10tn009.cfm

    [26] Lewis, Grace. Basics About Cloud Computing.

    http://www.sei.cmu.edu/library/abstracts/whitepapers/cloudcomputingbasics.cfm

    2010.

    [27] Clash of the Clouds. The Economist October 15, 2009.

    http://www.economist.com/displaystory.cfm?story_id=14637206 (accessed

    November 15, 2009).

    http://www.sei.cmu.edu/library/abstracts/reports/10tn009.cfmhttp://www.sei.cmu.edu/library/abstracts/reports/10tn009.cfm

  • Chapter 7 Bibliography 237

    [28] Proffitt, A. Pharma’s Early Cloud Adopters. BioIT World, November/December

    2009, pp.31-32.

    [29] Microsoft Sidekick users lose data. n

    http://www.telegraph.co.uk/technology/microsoft/6316609/Microsoft-Sidekick-users-

    lose-data.html (accessed November 28, 2009)

    [30] Farber, R. Cloud Computing: Pie in the Sky? ScientificComputing.com,

    November/December 2009

    [31] H.Erdogmous, 2009. “Cloud Computing: Does nirvana hide behindthe Nebula?”

    IEEE Software, vol 26.

    [32] D.Boneh, 2008. “Generalization Identity based and broadcast encryption

    achemes”. Vol 5350.

    [33] Richard Chow, Phillepe Goel. “Controlling data in the cloud” Foster, I., Zhau,

    Y., Ioan, R., & Lu, S. “Cloud Computing and Grid Computing 360-Degree

    Compared.” Grid Computing Environments Workshop, 2008.2

    .http://ieeexplore.ieee.org/xpls/abs_all.jsp? arnumber=4738445

    [34] Grossman, R. “The Case for Cloud Computing.” ITPro 11, 2 (March/April

    2009): 23-27.

    [35] Amazon Elastic Compute Cloud (EC2). http://aws.amazon.com/ec2/.

    [36] Amazon Virtual Private Cloud. http://aws.amazon.com/vpc/.

    [37] Amazon Web Services: Overview of Security Processes, White Paper.

    http://aws.amazon.com/security.

    [38] Animoto - Scaling Through Viral Growth. http:

    //aws.typepad.com/aws/2008/04/animoto---scali.html.

  • Chapter 7 Bibliography 238

    [39] DB2 for z/OS Performance Monitoring and Tuning Guide.

    http://publib.boulder.ibm.com/infocenter/dzichelp/v2r2/topic/com.ibm.db29.doc.perf/

    dsnpfk17.pdf.

    [40] IBM ILOG CPLEX. http://www-01.ibm.com/software/ integration/ optimization/

    cplex/.

    [41] IBM Service Management Tivoli Application Dependency Discovery Manager

    Software. http: //www-01.ibm.com/software/tivoli/products/taddm/.

    [42] Microsoft Windows Azure. http://www.microsoft.com/windowsazure/.

    [43] Riverbed Technology. http://www.riverbed.com/.

    [44] SQL Azure Firewall. http: //msdn.microsoft.com/en-us/library/ee621782.aspx.

    [45] The Case Against Cloud Computing. http://www.cio.com/article/477473/.

    [46] Websphere application server performance monitoring infrastructure (pmi).

    http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.web

    sphere.express.doc/info/exp/ae/cprf_pmi_arch.html.

    [47] M. K. Aguilera, J. C. Mogul, J. L. Wiener, P. Reynolds, and A. Muthitacharoen.

    Performance Debugging for Distributed Systems of Black Boxes. In Proc.SOSP,

    2003.

    [48] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G.

    Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A

    Berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS

    Department, University of California, Berkeley, Feb 2009.

  • Chapter 7 Bibliography 239

    [49] Arthur Cole. The Future Belongs to Hybrid Clouds.

    http://www.itbusinessedge.com/cm/blogs/cole/the-future-belongs-to-hybrid-

    louds/?cs=30482.

    [50] T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to

    Algorithms. McGraw-Hill Higher Education, 2001.

    [51] D. Gottfrid. The New York Times Archives + Amazon Web Services =

    TimesMachine. http://open.blogs.nytimes.com/2008/05/21/.

    [52] J. Hamilton. The Cost of Latency. http://perspectives.mvdirona

    com/2009/10/31/TheCostOfLatency.aspx, Oct. 2009.

    [53] L. E. Li, M. F. Nowlan, C. Tian, Y. R. Yang, and M. Zhang. Mosaic: Policy

    Homomorphic Network Extension. Technical Report YALEU/DCS/TR-1427,

    CS Department, Yale University, Feb 2010.

    [54] M. Tawarmalani and N. V. Sahinidis. Global optimization of mixed-integer

    nonlinear programs: A theoretical and computational study. Mathematical

    Programming, 99(3):563–591, 2004.

    [55] K. Magoutis, M. Devarakonda, and K. Muniswamy-Reddy. Galapagos:

    Automatically Discovering Application-Data Relationships in Networked Systems. In

    Proc. IM, 2007.

    [56] M. O’Neill. Connecting to the cloud. http:

    //www.ibm.com/developerworks/library/x-cloudpt1/.

    [57] K. Sripanidkulchai, S. Sahu, Y. Ruan, A. Shaikh, and C. Dorai. Are Clouds

    Ready for Large Distributed Applications? In Proc. SOSP LADIS Workshop, 2009.

    [58] Y.-W. E. Sung, S. G. Rao, G. G. Xie, and D. A. Maltz. Towards systematic

    design of enterprise networks. In Proc. CoNEXT, 2008.

  • Chapter 7 Bibliography 240

    [59] Symantec. 2010 State of the Data Center Global Data.

    http://www.symantec.com/content/en/us/about/media/pdfs/Symantec_DataCenter10_

    Report_Global.pdf.

    [60] B. Urgaonkar, G. Pacifici, P. J. Shenoy, M. Spreitzer, and A. N. Tantawi. An

    analytical model for multi-tier internet services and its applications. In Proc.

    SIGMETRICS, 2005.

    [61] B. Urgaonkar, P. Shenoy, A. Chandra, and P. Goyal. Dynamic Provisioning of

    Multi-tier Internet Applications. In Proc. ICAC, 2005.

    [62] T. Wood, P. Shenoy, A. Gerber, K. Ramakrishnan, and J. V. der Merwe. The

    Case for Enterprise-Ready Virtual Private Clouds. In Proc. HotCloud Workshop,

    2009.

    [63] G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, G. Hjalmtysson, and J.

    Rexford. On static reachability analysis of IP networks. In Proc. INFOCOM, 2005.

    [64] D. Agrawal, A. El Abbadi, S. Antony, and S. Das. Data Management Challenges

    in Cloud Computing Infrastructures. In DNIS, pages 1–10, 2010. 3

    [65] M. Armbrust, A. Fox, D. A. Patterson, N. Lanham, B. Trushkowsky, J. Trutna,

    and H. Oh. SCADS: Scale Independent Storage for Social Computing Applications.

    In CIDR Perspectives, 2009. 11

    [66] S. Aulbach, T. Grust, D. Jacobs, A. Kemper, and J. Rittinger. Multi-tenant

    databases for software as a service: schema-mapping techniques. In SIGMOD, pages

    1195–1206, 2008. 1, 2, 11

    [67] F. R. Bach and M. I. Jordan. Kernel independent component analysis. J. Mach.

    Learn. Res., 3:1–48, 2003. 14

  • Chapter 7 Bibliography 241

    [68] M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska. Building a

    database on S3. In SIGMOD, pages 251–264, 2008. 11

    [69] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T.

    Chandra, A. Fikes, and R. E. Gruber. Bigtable: A Distributed Storage System for

    Structured Data. In OSDI, pages 205–218, 2006. 2, 3, 8, 11

    [70] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A.

    Warfield. Live migration of virtual machines. In NSDI, pages 273–286, 2005. 2, 4,

    11, 14

    [71] B. F. Cooper, R. Ramakrishnan, U. Srivastava, A. Silberstein, P. Bohannon, H.-

    A. Jacobsen, N. Puz, D. Weaver, and R. Yerneni. PNUTS: Yahoo!’s hosted data

    serving platform. Proc. VLDB Endow., 1(2):1277–1288, 2008. 2, 3, 11

    [72] B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears.

    Benchmarking Cloud Serving Systems with YCSB. In ACM SoCC, pages 143–154,

    2010. 2, 9, 10

    [73] C. Curino, E. Jones, Y. Zhang, E. Wu, and S. Madden. Relational Cloud: The

    Case for a Database Service. Technical Report 2010-14, CSAIL, MIT, 2010. 4, 11

    url: https://en.wikipedia.org/wiki/High-net-worth_individual

    [74] S. Das, S. Agarwal, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic,

    Scalable, and Self Managing Transactional Database for the Cloud. Technical Report

    2010-04, CS, UCSB, 2010. http://www.cs.ucsb.edu/research/tech_reports/.1, 2, 7, 8,

    9, 11

    [75] S. Das, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic Transactional Data

    Store in the Cloud. In USENIX HotCloud, 2009. 2

  • Chapter 7 Bibliography 242

    [76] S. Das, D. Agrawal, and A. El Abbadi. G-Store: A Scalable Data Store for

    Transactional Multi key Access in the Cloud. In ACM SoCC, pages 163–174, 2010.

    3, 11

    [77] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin,

    S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: Amazon’s highly

    available key-value store. In SOSP, pages 205–220, 2007. 1, 2, 3, 11

    [78] D. J. Dewitt, S. Ghandeharizadeh, D. A. Schneider, A. Bricker, H. I. Hsiao, and

    R. Rasmussen. The Gamma Database Machine Project. IEEE Trans. on Knowl. and

    Data Eng., 2(1):44–62, 1990.

    [79] A. Elmore, S. Das, D. Agrawal, and A. El Abbadi. Who’s Driving this Cloud?

    Towards Efficient Migration for Elastic and Autonomic Multitenant Databases.

    Technical Report 2010-05, CS, UCSB, 2010. http://www.cs.ucsb.edu/ research/ tech_

    reports/.9, 11

    [80] K. P. Eswaran, J. N. Gray, R. A. Lorie, and I. L. Traiger. The notions of

    consistency and predicate locks in a database system. Commun. ACM, 19(11):624–

    633, 1976. 14

    [81] Facebook Statistics. http://www.facebook.com/press/info.php?statistics,

    Retreived July 23, 2010. 1

    [82] A. Ganapathi, H. A. Kuno, U. Dayal, J. L. Wiener, A. Fox, M. I. Jordan, and D.

    A. Patterson. Predicting multiple metrics for queries: Better decisions enabled by

    machine learning. In ICDE, pages 592–603, 2009. 14

    [83] J. Gray. Notes on data base operating systems. In Operating Systems, An

    Advanced Course, pages 393–481, London, UK, 1978. Springer-Verlag. 5, 6

    [84] J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques.

    Morgan Kaufmann Publishers Inc., 1992. 4

  • Chapter 7 Bibliography 243

    [85] P. Helland. Life beyond Distributed Transactions: An Apostate’s Opinion. In

    CIDR, pages 132–141, 2007. 3

    [86] P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. ZooKeeper: Wait-free

    Coordination for Internet-scale Systems. In USENIX Annual Technical Conference,

    2010. 8, 9

    [87] D. Jacobs and S. Aulbach. Ruminations on multi-tenant databases. In BTW,

    pages 514–521, 2007. 1, 2, 3, 11

    [88] T. Kraska, M. Hentschel, G. Alonso, and D. Kossmann. Consistency Rationing in

    the Cloud: Pay only when it matters. PVLDB, 2(1):253–264, 2009. 11, 12

    [89] H. T. Kung and J. T. Robinson. On optimistic methods for concurrency control.

    ACM Trans. Database Syst., 6(2):213–226, 1981. 4, 8, 14

    [90] H. Liu, H. Jin, X. Liao, L. Hu, and C. Yu. Live migration of virtual machine

    based on full system trace and replay. In HPDC, pages 101–110, 2009. 11

    [91] D. B. Lomet, A. Fekete, G. Weikum, and M. J. Zwilling. Unbundling transaction

    services in the cloud. In CIDR Perspectives, 2009. 3, 11

    [92] J. B. Rothnie Jr., P. A. Bernstein, S. Fox, N. Goodman, M. Hammer, T. A.

    Landers, C. L. Reeve, D. W. Shipman, and E. Wong. Introduction to a System for

    Distributed Databases url: http://www.codeproject.com/Articles/49662/cloud-

    computing-SaaS (SDD-1). ACM Trans. Database Syst., 5(1):1–17, 1980. 11

    [93] G. H. Sockut and B. R. Iyer. Online reorganization of databases. ACM Comput.

    Surv., 41(3):1–136, 2009. 11

    [94] A. A. Soror, U. F. Minhas, A. Aboulnaga, K. Salem, P. Kokosielis, and S.

    Kamath. Automatic virtual machine configuration for database workloads. In

    SIGMOD, pages 953–966, 2008. 1, 2, 11

  • Chapter 7 Bibliography 244

    [95] The Transaction Processing Performance Council. TPC-C benchmark (Version

    5.10.1), 2009. 2, 9, 10

    [96] C. D. Weissman and S. Bobrowski. The design of the force.com multitenant

    internet application development platform. In SIGMOD, pages 889–896, 2009. 1, 2,

    11

    [97] F. Yang, J. Shanmugasundaram, and R. Yerneni. A scalable data platform for a

    large number of small applications. In CIDR, 2009

    [98] J. Baker, C. Bond, J. Corbett, J. Furman, A. Khorlin, J. Larson, J.-M. Leon, Y.

    Li, A. Lloyd, and V. Yushprakh. Megastore: Providing Scalable, Highly Available

    Storage for Interactive Services. In CIDR, pages 223–234, 2011.

    [99] H. Berenson, P. Bernstein, J. Gray, J. Melton, E. O’Neil, and P. O’Neil. A

    critique of ANSI SQL isolation levels. In SIGMOD, pages 1–10, 1995.

    [100] P. A. Bernstein, I. Cseri, N. Dani, N. Ellis, A. Kalhan, G. Kakivaya, D. B.

    Lomet, R. Manner, L. Novik, and T. Talius. Adapting Microsoft SQL Server for

    Cloud Computing. In ICDE, 2011.

    [101] P. A. Bernstein and E. Newcomer. Principles of Transaction Processing.

    Morgan Kaufmann Publishers Inc., second edition, 2009.

    [102] R. Bradford, E. Kotsovinos, A. Feldmann, and H. Schiöberg. Live wide-area

    migration of virtual machines including local persistent state. In VEE, pages 169–179,

    2007.

    [103] M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska. Building a

    database on S3. In SIGMOD, pages 251–264, 2008.

  • Chapter 7 Bibliography 245

    [104] S. Chandrasekaran and R. Bamford. Shared cache – the future of parallel

    databases. In ICDE, pages 840–850, 2003.

    [105] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A.

    Warfield. Live migration of virtual machines. In NSDI, pages 273–286, 2005.

    [106] B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears.

    Benchmarking Cloud Serving Systems with YCSB. In ACM SoCC, pages 143–154,

    2010.

    [107] C. Curino, E. Jones, R. Popa, N. Malviya, E. Wu, S. Madden, H. Balakrishnan,

    and N. Zeldovich. Relational Cloud: A Database Service for the Cloud. In CIDR,

    pages 235–240, 2011.

    [108] S. Das, S. Agarwal, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic,

    Scalable, and Self Managing Transactional Database for the Cloud. Technical Report

    2010-04, CS, UCSB, 2010.

    [109] S. Das, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic Transactional Data

    Store in the Cloud. In USENIX HotCloud, 2009.

    [110] S. Das, S. Nishimura, D. Agrawal, and A. El Abbadi. Live Database Migration

    for Elasticity in a Multitenant Database for Cloud Platforms. Technical Report 2010-

    09, CS, UCSB, 2010.

    [111] K. P. Eswaran, J. N. Gray, R. A. Lorie, and I. L. Traiger. The notions of

    consistency and predicate locks in a database system. Commun. ACM, 19(11):624–

    633, 1976.

    [112] Facebook Statistics. http://www.facebook.com/press/info.php?statistics,

    Retreived March 18, 2010.

  • Chapter 7 Bibliography 246

    [113] J. Gray. Notes on data base operating systems. In Operating Systems, An

    Advanced Course, pages 393–481, London, UK, 1978. Springer-Verlag.

    [114] J. N. Gray, R. A. Lorie, and G. R. Putzolu. Granularity of locks in a shared data

    base. In VLDB, pages 428–451, 1975.

    [115] H2 Database Engine. http://www.h2database.com/html/main.html, 2011.

    [116] D. Jacobs and S. Aulbach. Ruminations on multi-tenant databases. In BTW,

    pages 514–521, 2007.

    [117] H. Liu, H. Jin, X. Liao, L. Hu, and C. Yu. Live migration of virtual machine

    based on full system trace and replay. In HPDC, pages 101–110, 2009.

    [118] D. B. Lomet. Replicated indexes for distributed data. In PDIS, pages 108–119.

    IEEE Computer Society, 1996.

    [119] D. B. Lomet, A. Fekete, G. Weikum, and M. J. Zwilling. Unbundling

    transaction services in the cloud. In CIDR, 2009.

    [120] C. Mohan, D. Haderle, B. Lindsay, H. Pirahesh, and P. Schwarz. Aries: a

    transaction recovery method supporting fine-granularity locking and partial rollbacks

    using write-ahead logging. ACM TODS, 17(1):94–162, 1992.

    [121] A. A. Soror, U. F. Minhas, A. Aboulnaga, K. Salem, P. Kokosielis, and S.

    Kamath. Automatic virtual machine configuration for database workloads. In

    SIGMOD, pages 953–966, 2008.

    [122] C. D. Weissman and S. Bobrowski. The design of the force.com multitenant

    internet application development platform. In SIGMOD, pages 889–896, 2009.

    [123] F. Yang, J. Shanmugasundaram, and R. Yerneni. A scalable data platform for a

    large number of small applications. In CIDR 2009

  • Chapter 7 Bibliography 247

    [124] McKinsey & Co. Report presented at Uptime Institute Symposium April 18,

    2009. Clearing the Air on Cloud Computing. http://uptimeinstitute.org/

    content/view/353/319;http://images.cxotoday.com/cxoimages/storyimagesmatter1011

    57 .pdf (accessed November 27, 2009).

    [125] Traian Andrei & Prof. Raj Jain, Cloud Computing Challenges and Related

    Security Issues, url: http://www.cse.wustl.edu/~jain/cse571-09/index.html April 30,

    2009

    [126] Alistair Croll, "Why Cloud Computing Needs Security", 2008 url:

    http://gigaom.com/2008/06/10/the-amazon-outage-fortresses-in-the-clouds/

    [127 Jonothan Erickson, "Best Practices for Protecting Data in the Cloud", 2008

    http://www.ddj.com/security/210602698

    [128] Jon Brodkin, "Seven Cloud-Computing Security Risks", 2008

    http://www.networkworld.com/news/2008/070208-cloud.html

    [129] Elinor Mills, "Cloud Computing Security Forecast: Clear Skies", 2009

    http://news.zdnet.com/2100-9595_22-264312.html

    [130] Geva Perry, "How Cloud & Utility Computing Are Different", 2008

    http://gigaom.com/2008/02/28/how-cloud-utility-computing-are-different/

    [131] Neil Wienberg, "Cloudy picture for cloud computing", 2008

    http://www.networkworld.com/news/2008/043008-interop-cloudcomputing.html

    [132] Ephraim Schwartz, "Hybrid model brings security to the cloud", 2008

    http://www.infoworld.com/d/cloud-computing/hybrid-model-brings-security-cloud-

    364

    [133] The Open Cloud Consortium, 2008

  • Chapter 7 Bibliography 248

    http://www.opencloudconsortium.org/index.html

    [134] Open Security Architecture, 2009 http://www.opensecurityarchitecture.org/cms/

    [135] Paul Jaeger, Jimmy Lin, Justin Grimes, "Cloud Computing and Information

    Policy", March 2008

    [136] Shivlal Mewada, Umesh kumar Singh and Pradeep Sharma, Security Based

    Model for Cloud Computing IRACST – International Journal of Computer Networks

    and Wireless Communications (IJCNWC), Vol. 1, No. 1, December 2011

    [137] Ricardo vilaca, Rui oliveira 2009. Clouder: A Flexible Large Scale

    Decentralized Object Store. Architecture Overview. Proceeding of WDDDM ’09

    [138] Michael Miller. Cloud Computing-Web Based Application that change the way

    you collaborate online. Publishing of QUE, 2nd print. 2009

    [139] National Institute Of Standard and technology.csrc.nist.gov/groups/ SNS/cloud-

    computing/cloud-def-v15.doc, 2009

    [140] Open Security Architecture http://www.opensecurityarchitecture.org/

    [141] Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy :

    An Enterprise perspective of Risks

    [142] GregBoss, Padma Malladi, Dennis Quan, Linda Legregni and Harold hall

    Cloud Computing. Available from www.ibm.com/developerworks/ websphere/ zones

    /hipods/, 2007.

    [143] Anthony T.Velte, Toby J.Velte and Robert Elsenpeter. Cloud Computing- A

    Practical Approach. Publishing of Tata McGRAW Hill, 2010

  • Chapter 7 Bibliography 249

    [144] Saurabh Kumar. Security Issues In Cloud Computing. Available

    fromserl.iiit.ac.in/cs6600/saurabh.ppt.

    [145] Krešimir Popović, Željko Hocenski,” Cloud computing security issues and

    challenges”, MIPRO 2010, May 24-28, 2010

    [146] Gartner: Seven cloud-computing security risks, 02 July 2008,

    http://www.infoworld.com/d/security-central/gartnersevencloud-computing-security-

    risks-853

    [147] Wikipedia, 6 February 2010, http://en.wikipedia.org/wiki/Risk_management

    [148] Wikipedia, 27 January 2010, http://en.wikipedia.org/wiki/Risk_assessment

    [149] D. Catteddu, Giles Hogben: European Network and Information Security

    Agency, November 2009.

    http://www.enisa.europa.eu/act/rm/ files/deliverables/ cloud computing-risk-

    assessment

    [150] P Mell, K Scarfone, S Romanosky - Published by FIRST-Forum of Incident,

    June 2007.

    [151] Mike Schiffman, Gerhard Eschelbeck, David Ahmad, Andrew Wright, Sasha

    Romanosky, "CVSS: A Common Vulnerability Scoring System", National

    Infrastructure Advisory Council (NIAC), 2004.

    [152] Microsoft Corporation. Microsoft Security Response Center Security Bulletin

    Severity Rating System. November 2002.

    http://www.microsoft.com/technet/security/bulletin/rating.mspx.

    [153] United States Computer Emergency Readiness Team (US-CERT). US-CERT

    Vulnerability Note Field Descriptions. 2006.

    http://www.kb.cert.org/vuls/html/fieldhelp.

    http://scholar.google.co.in/citations?user=8qgO4BEAAAAJ&hl=en&oi=sra

  • Chapter 7 Bibliography 250

    [154] SANS Institute. SANS Critical Vulnerability Analysis Archive. Undated,2007.

    http://www.sans.org/newsletters/cva/.

    [155] Arnold, John. “Domain 10: Guidance for Application Security V2.1.” Cloud

    Security Alliance, July 2010

    http://www.cloudsecurityalliance.org/guidance/csaguidedom10-v2.10.pdf,

    [156] Badger, Lee, and Tim Grance. “Standards Acceleration to Jumpstart Adoption

    of Cloud Computing.” NIST Computer Security Division Briefing, May 20, 2010 at:

    http://www.slideshare.net/kvjacksn/nist-cloud-computingforumbadgergrance.

    [157] Baldor, Lolita C. “Pentagon spends $100M to fix Cyber Attacks.” Physorg.com,

    April 7,2009

    http://www.physorg.com/news158333019.html.

    [158] Beckman, Mel. “Cloud Options that IT will Love.” An Interactive eBook:

    Cloud Computing, July 15, 2010

    http://www.networkworld.com/whitepapers/nww/pdf/eGuide_cloud_5brand_final.pdf

    .

    [159]Biscotti, Fabrizio, Benoit J. Lheureux, Andrew Frank, Jeffrey Roster, Susan

    Cournoyer, and Venecia K. Liu. “Forecast: Public Cloud Services, Worldwide and

    Regions, Industry Sectors, 2009-2014.” Gartner, Inc., June 2, 2010,

    http://www. gartner.com/DisplayDocument?ref=clientFriendlyUrl&id=1378513

    [160] Bolin, Jason S. Use Case Analysis for Adopting Cloud Computing in Army

    Test and Evaluation. Naval Postgraduate School Master’s Thesis, September 2010

    http://edocs.nps.edu/npspubs/scholarly/theses/2010/Sep/10Sep_Bolin.pdf

    [161] Brodkin, Jon. “Gartner: Seven cloud computing security risks.” Infoworld, July

    2, 2008

    http://www.infoworld.com/d/security-central/gartner-seven-cloud-computingsecurity-

    risks-853.

  • Chapter 7 Bibliography 251

    [162] Brunette, Glenn and Rich Mogull, “Security Guidance for Critical Areas of

    Focus in Cloud Computing, V2.1.” Cloud Security Alliance, December 2009,

    at: http://www.cloudsecurityalliance.org/csaguide.pdf.

    [163] Carey, Allan. “Cloud Assurance Still Missing,” Information Assurance

    Newsletter, Vol. 13, No. 1, 2010.

    [164] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G.

    Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds: A

    Berkeley View of Cloud Computing, 2009.

    [165] “Microsoft Windows Azure” http://www.microsoft.com/windowsazure/.

    [166] “Google App Engine” http://code.google.com/appengine/.

    [167] I. Foster and C. Kesselman, “The grid: blueprint for a new computing

    infrastructure,” Oct. 1998.

    [168] S. Clearwater, Market-Based Control: A Paradigm for Distributed Resource

    Allocation, World Scientific, 1996.

    [169] J. Shneidman, C. Ng, D.C. Parkes, A. AuYoung, A.C. Snoeren, A. Vahdat, and

    B. Chun, “Why Markets Could (But Don’t Currently) Solve Resource Allocation

    Problems in Systems,” Challenges, 2005

    [170] P. Cramton, Y. Shoham, and R. Steinberg, Combinatorial Auctions, The MIT

    Press, 2005.

    [171] A. Das and D. Grosu, “Combinatorial auction-based protocols for resource

    allocation in grids,” Parallel and Distributed Processing Symposium, 2005.

    Proceedings. 19th

    IEEE International, 2005.

  • Chapter 7 Bibliography 252

    [172] A. Marshall, Principles of Economics (Great Minds Series), Prometheus Books,

    1997.

    [173] “Market,” From Wikipedia, the free encyclopedia

    http://en.wikipedia.org/wiki/Market.

    [174] D. Friedman, “The double auction market institution: A survey,” The Double

    Auction Market: Institutions, Theories, And Evidence, J. Rust, ed., Westview Press,

    pp. 3-26, 1993

    [175] R. Buyya,D. Abramson, J. Giddy, and H. Stockinger, “Economic models for

    resource management and scheduling in Grid computing,” Concurrency and

    Computation: Practice and Experience, pp. 1507-1542, vol. 14, 2002.

    [176] Y. Shoham and K. Leyton-Brown, Multiagent systems: Algorithmic,

    game-theoretic, and logical foundations, Cambridge Univ Pr, 2009.

    [177] D.S. Diamond and L.L. Selwyn, “Considerations for computer utility pricing

    policies,” Proceedings of the 1968 23rd ACM national conference, New York,

    New York, USA: ACM Press, pp. 189-200, 1968

    [178] I.E. Sutherland, “A futures market in computer time,” Communications of the

    ACM, vol. 11, pp. 449-451, Jun. 1968

    [179] R. Buyya, D. Abramson, and S. Venugopal, “The Grid Economy,” Proceedings

    of the IEEE, vol. 93, pp. 698-714, Mar. 2005

    [180] C.S. Yeo and R. Buyya, “A taxonomy of market-based resource management

    systems for utility-driven cluster computing,” Software: Practice and Experience, vol.

    36, pp. 1381-1419, Nov. 2006

    [181] R. Buyya and M. Murshed, “GridSim: a toolkit for the modeling and simulation

    of distributed resource management and scheduling for Grid computing,”

  • Chapter 7 Bibliography 253

    Concurrency and Computation: Practice and Experience, vol. 14, pp. 1175-1220, Nov.

    2002

    [182] R. Buyya, R. Ranjan, and R.N. Calheiros, Modeling and simulation of scalable

    Cloud computing environments and the CloudSim toolkit: Challenges and

    opportunities, IEEE, 2009.

    [183] C.A. Waldspurger, T. Hogg, B.A. Huberman, J.O. Kephart, and W.S. Stornetta,

    “Spawn: A Distributed Computational Economy,” IEEE Transactions on Software

    Engineering, pp. 103-117, vol. 18, Feb. 1992

    [184] U.S. Interagency OPSEC Support Staff, OPSEC Glossary of Terms available

    from http://www.ioss.gov/docs/definitions.html; Internet, accessed 18 October 2005

    [183] Sun Microsystems, Introduction to Cloud Computing Architecture, 2009

    [184] Fellows, W. Partly Cloudy, Blue-Sky Thinking About Cloud Computing. 451

    Group, 2008

    [185] Varia, J. Cloud Architectures. Amazon Web Services, 2009.

    [186] Chappell, D. Introducing the Azure Services Platform. David Chappell &

    Associates, 2009

    [187] Rayport, J. F. And Heyward, A. Envisioning the Cloud: The Next Computing

    Paradigm. Market space, 2009.

    [188] Pastaki Rad, M., Sajedi Badashian, A., Meydanipour, G., Ashurzad Delcheh,

    M., Alipour, M. And Afzali, H. A Survey Of Cloud Platforms and Their Future, 2009.

    [189] Khajeh-Hosseini, A., Sommerville, I. And Sriram, I. "Research Challenges for

    Enterprise Cloud Computing," (unpublished).( Submitted to 1st ACM

  • Chapter 7 Bibliography 254

    Symposium on Cloud Computing, Indianapolis, Indiana, USA, under paper id 54,

    June 2010

    [190] IBM, Staying aloft in tough times, 2009

    [191] Plummer, D.C., Bittman , T.J., Austin, T., Cearley, D.W., And Smith D.M.,

    Cloud Computing: Defining And Describing An Emerging Phenomenon , 2008

    [192] Staten, J., Is Cloud Computing Ready For The Enterprise?, 2008.

    [193] Mell, P. And Grance, T. 2009. Draft Nist Working Definition Of Cloud

    Computing.

    [194] Erdogmus, H. Cloud Computing: Does Nirvana Hide Behind The Nebula?

    Software, IEEE 26, 2, 4-6, 2009

    [195] Lemos, R. 2009. Inside One Firm's Private Cloud Journey. Retrieved December

    1, 2009, from http://www.cio.com/article/506114/Inside_One_Firm_s_Pri

    vate_Cloud_Journey

    [196] Open CirrusTM: the HP/Intel/Yahoo! Open Cloud Computing Research

    Testbed. Retrieved December 1, 2009, from https://opencirrus.org/

    [197] Vaquero, L., Merino, L., Caceres, J. And Lindner, M. A break in the clouds:

    towards a cloud definition. SIGCOMM Comput. Commun. Rev. 39, 1, 50-55, 2009.

    [198] Youseff, L., Butrico, M. And Da Silva, D. 2008. Toward a Unified Ontology of

    Cloud Computing. In Grid Computing Environments Workshop, GCE '08, 1-10,

    2008.

    [199] J. Appavoo, V. Uhlig, and A. Waterland, "Project Kittyhawk: Building a

    Global-Scale Computer," vol. 42, pp. pp. 77-84, , 2008

  • Chapter 7 Bibliography 255

    [200] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D.

    Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds: A Berkeley View

    of Cloud Computing, 2009.

    [201] Weinman, J. 10 Reasons Why Telcos Will Dominate Enterprise Cloud

    Computing, 2008

    [202] Voas, J. And Zhang, J. Cloud Computing: New Wine Or Just A New Bottle? IT

    Professional 11, 2, 15-17, 2009.

    [203]Vouk, M. A. 2008. Cloud computing — Issues, research and

    implementations. In Information Technology Interfaces, ITI 2008. 30th International

    Conference on, 31-40, 2008.

    [204] Foster, I., Zhao, Y., Raicu, I. And Lu, S. 2008. Cloud Computing and Grid

    Computing 360-Degree Compared. In Grid Computing Environments Workshop

    (GCE '08), Austin, Texas, USA, November 2008.

    [205] Corbató, F. J., Saltzer, J. H., and Clingen, C. T. 1972. Multics: the first seven

    years. In Proceedings of the May 16-18, 1972, Spring Joint Computer Conference,

    Atlantic City, New Jersey, 571-583, May 1972

    [206] Buyya, R., Yeo, C. And Venugopal, S. 2008. Market-Oriented Cloud

    Computing: Vision, Hype, and Reality for Delivering IT Services as Computing

    Utilities. In High Performance Computing and Communications. HPCC '08. 10th

    IEEE International Conference on, 5-13, 2008

    [207] Chang, M., He, J., And E. Leon, "Service-Orientation in the Computing

    Infrastructure," pp. 27-33, 2006.

    [208] Sedayao, J. Implementing And operating an internet scale distributed

    application using service oriented architecture principles and cloud computing

  • Chapter 7 Bibliography 256

    infrastructure. In iiWAS '08: Proceedings of the 10th International Conference on

    Information Integration and Web-based Applications & Services, 417-421, 2008

    [209] Zhang, L. And Zhou, Q. Ccoa: Cloud Computing Open Architecture. In Web

    Services, 2009. ICWS 2009. IEEE International Conference on, 607-616, 2009

    [210] Napper, J. And Bientinesi, P. Can cloud computing reach the top500? In

    UCHPC-MAW '09: Proceedings of the combined workshops on UnConventional high

    performance computing workshop plus memory access workshop, 17-20, 2009

    [211] Birman, K., Chockler, G., and van Renesse, R. Toward a cloud computing

    research agenda. SIGACT News, 40, 2, 68-80, 2009

    [212] Keahey, K., Tsugawa, M., Matsunaga, A. And Fortes, J. Sky Computing.

    Internet Computing, IEEE 13, 5, 43-51, 2009

    [213] Ohlman, B., Eriksson, A. And Rembarz, R. 2009. What Networking of

    Information Can Do for Cloud Computing. In Enabling Technologies: Infrastructures

    for Collaborative Enterprises. WETICE '09. 18th IEEE International Workshops on,

    78-83, 2009

    [214] Matthews, J., Garfinkel, T., Hoff, C. And Wheeler, J.. Virtual machine contracts

    for datacenter and cloud computing environments. In ACDC'09: Proceedings of the

    1st workshop on Automated control for datacenters and clouds, 25-30, 2009

    [215] Lim, H., Babu, S., Chase, J. And Parekh, S. Automated Control In Cloud

    computing: challenges and opportunities. In ACDC '09: Proceedings of the 1st

    workshop on Automated control for datacenters and clouds, 13-18., 2009

    [216] Mikkilineni, R. And Sarathy, V. Cloud Computing and the Lessons from the

    Past. In Enabling Technologies: Infrastructures for Collaborative Enterprises.

    WETICE '09. 18th IEEE International Workshops on, 57-62, 2009

  • Chapter 7 Bibliography 257

    [217] Grossman, R. L. The Case For Cloud Computing. It Professional 11, 2, 23-27.

    2009

    [218] Sotomayor, B., Rubã©, A., Llorente, I. And Foster, I.. Virtual Infrastructure

    Management In Private And Hybrid Clouds. Internet Computing, Ieee 13, 5, 14-22,

    2009

    [219] Song, S., Ryu, K. And Da Silva, D. 2009. Blue Eyes: Scalable And Reliable

    System Management For Cloud Computing. In Parallel & Distributed Processing,

    Ipdps 2009. Ieee International Symposium On, 1-8, 2009.

    [220] Vishwanath, K., Greenberg, A. And Reed, D. Modular Data Centers: How To

    Design Them? 2009

    [221] Sriram, I. 2009. A Simulation Tool Exploring Cloudscale Data Centres. In 1st

    International Conference On Cloud Computing, Pp. 381-392, 2009

    [222] Buyya, R., Ranjan, R. And Calheiros, R. N. 2009. Modeling And Simulation Of

    Scalable Cloud Computing Environments And The Cloudsim Toolkit: Challenges

    And Opportunities. In High Performance Computing & Simulation. Hpcs '09.

    International Conference On, 1-11, 2009

    [223] H. Abdelsalam, K. Maly, R. Mukkamala, M. Zubair, And D. Kaminsky,

    "Towards Energy Efficient Change Management In A Cloud Computing

    Environment," Pp. 161-166, 2009

    [224] Chun, B.-G. And Maniatis, P. Augmented Smart Phone Applications Through

    Clone Cloud Execution. In Proceedings Of The 12th Workshop On Hot Topics In

    Operating Systems (Hotos Xii), 2009

    [225] Ganon, Z. And Zilbershtein, I. E. Cloud-Based Performance Testing Of

    Network Management Systems. In Computer Aided Modeling And Design Of

  • Chapter 7 Bibliography 258

    Communication Links And Networks, Camad '09. Ieee 14th International Workshop

    On, 1-6, 2009.

    [226] Mathew, R. And Spraetz, R. Test Automation On A Saas Platform. In Software

    Testing Verification And Validation, 2009. Icst '09. International Conference On,

    317-325. 2009

    [227] Wilson, M. Constructing And Managing Appliances For Cloud Deployments

    From Repositories Of Reusable Components. 2009

    [228] Mei, L., Chan, W. K. And Tse, T. H. A Tale Of Clouds: Paradigm Comparisons

    And Some Thoughts On Research Issues. In Asia-Pacific Services Computing

    Conference, 2008. Apscc '08. Ieee, 464-469, 2008

    [229] Al-Daoud, H., Al-Azzoni, I., Down, D. “Power-Aware Linear Programming

    Based Schedulingfor Heterogeneous Server Clusters”, Future Generation Computer

    Systems, 28, Pp. 745–754. 2012

    [230] Armbrust, M. Fox, A., Friffith, R., Joseph, A. D., Katz, R., Konwinskii, A., Lee,

    G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M. “A View Of Cloud Computing”,

    Communications Of The Acm, 53(4), 2010

    [231] Bapna, R., Das, S., Day, R., Garfinkel, R., Stallaert, J. “A Clock-And-Offer

    Auction Market For Grid Resources When Bidders Face Stochastic Computational

    Needs”, Informs Journal On Computing, 23(4), Pp. 630–647.17, 2011

    [232] Bartholdi, J. J., Hackman, S. T. “Warehouse And Distribution Science”,

    Version 0.95, 2011

    [233] Bin, E., Biran, O., Boni, O., Hadad, E., Kolodner, E. K., Moatti, Y., Lorenz, D.

    H. “Guaranteeing High Availability Goals For Virtual Machine Placement”, Proc.

    Icdcs Conference, Pp. 700-709, 2011

  • Chapter 7 Bibliography 259

    [234] Chen, H., Yao, D. D. “Fundamentals Of Queueing Networks”, Springer, 2001

    [235] Dai, J., Lin. W. “Maximum Pressure Policies In Stochastic Processing

    Networks” Operations Research, 53(2), Pp. 197–218. 2005

    [236] Dieker, A. B., Ghosh, S., Squillante, M. S. “Optimal Resource Capacity

    Management For Stochastic Networks”, Preprint, 2012

    [237] Dieker, A. B., Shin, J. “From Local To Global Stability In Stochastic

    Processing Networks Through Quadratic Lyapunov Functions”, To Appear In

    Mathematics Of Operations Research, 2012

    [238] Foster, I., Zhao, Y., Raicu, I., Lu, S. “Cloud Computing And Grid Computing

    360-Degree Compared”, Proc. Grid Computing Environments Workshop, Pp. 1–10,

    2008

    [239] Security Management In The Cloud. Available

    Http://Mscerts.Net/Programming/Security%20management%20in%20the%20cloud.A

    spx

    [240] Gentry, C. “Computing Arbitrary Functions Of Encrypted Data”,

    Communications Of The Acm, 53(3), 2010

    [241] Ghosh, R., Naik V., Trivedi, K. “Power-Performance Trade-Offs In Iaas Cloud:

    A Scalable Analytic Approach”, Proc. Ieee Dsn-W Conference, Pp. 152–157, 2011

    [242] Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. “The Cost Of A Cloud:

    Research Problems In Data Center Networks”, Acm Sigcomm Computer

    Communications Review, 2009.

    [243] Iyoob, I., Zarifoglu, E. “Optimal Capacity Management For Iaas Consumers”,

    Working Paper, 2011

  • Chapter 7 Bibliography 260

    [244] Iyoob, I., Zarifoglu, E., Modh, M., Farooq, M. “Optimally Sourcing Services In

    Hybrid Cloud Environments”, Us Patent Filed 13/373,162, 2011

    [245] Klancnik, T., Blazic, B.J. “Context-Aware Information Broker For Cloud

    Computing”, International Review On Computer And Software, 5(1). 2010

    [246] [I] S. Roschke, Et Ai., "Intrusion Detection In The Cloud," Presented At The

    Eighth Ieee International Conference On Dependable, Autonomic And Secure

    Computing, Chengdu, China, 2009.

    [247] J Brodkin. Gartner Seven Cloud-Computing Security Risks, 2008

    Available: Http://Www.Networkworld.Com/News/200s!07020scloud.Html

    [248] D. L. Ponemon, "Security Of Cloud Computing Users," 2010.

    [249] S. K. Tim Mather, And Shahed Latif, Cloud Security And Privacy: O'reilly

    Media, Inc , 2009.

    [250] C. Almond, "A Practical Guide To Cloud Computing Security," 27 August

    2009.

    [251] Http://Cloudsecurity.Trendmicro.Com/

    [252] N. Mead, Et Ai, "Security Quality Requirements Engineering (Square)

    Methodolgy," Carnegie Mellon Software Engineering Institute.

    [253] J. W.Rittinghouse And J. F.Ransome, Cloud Computing: Taylor And Francis

    Group, Llc, 2010.

    [254] 22. Maguluri, S. T., Srikant, R., Ying, L. “Stochastic Models Of Load

    Balancing And Scheduling In Cloud Computing Clusters”, Proc. Ieee Infocom

    Conference, Pp. 702–710, 2012

  • Chapter 7 Bibliography 261

    [255] Mateus, C. R., Gautam, N. “Efficient Control Of An M/Mt/Kt Queue With

    Application To Energy Management In Data Centers”, 2011

    [256]. Mell, P., Grance., T. “The Nist Definition Of Cloud Computing”, Special

    Publication 800-145, National Institute Of Standards And Technology. 2011

    [257] Menascé, D. A, Ngo, P. “Understanding Cloud Computing: Experimentation

    And Capacity Planning”, Proc. Computer Measurement Group Conference, 2009

    [258] Meng, X., Isci, C., Kephart, J., Zhang, L., Bouillet, E., Pendarakis, D. “Efficient

    Resource Provisioning In Compute Clouds Via Vm Multiplexing”, Proc. Icac

    Conference, Pp. 11–20, 2010.

    [259] Mojcilović, A., Connors, D. “Workforce Analytics For The Services Economy”

    In: Maglio, P. Et Al (Eds), Handbook Of Service Science, Springer, 2010.

    [260] Security Management In The Cloud - Access Control. Available:

    Http://Mscerts.Net/Programming/Security%20management%20in%20the%20cloud%

    20-%20access%20control.Aspx


Recommended