Chapter 7 Bibliography 234
CHAPTER 7
BIBLIOGRAPHY
[1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee,
D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds : A Berkeley
View of Cloud Computing, 2009.
[2] “Microsoft Windows Azure” http://www.microsoft.com/windowsazure/.
[3] “Google App Engine” http://code.google.com/appengine/.
[4] I. Foster and C. Kesselman, “The grid: blueprint for a new computing
infrastructure,” Oct. 1998.
[5] S. Clearwater, Market-Based Control: A Paradigm for Distributed Resource
Allocation, World Scientific, 1996.
[6] J. Shneidman, C. Ng, D.C. Parkes, A. AuWeng, A.C. Snoeren, A. Vahdat, and B.
Chun, “Why Markets Could (But Don’t Currently) Solve Resource Allocation
Problems in Systems,” Challenges, 2005, p. 7.
[7] P. Cramton, Y. Shoham, and R. Steinberg, Combinatorial Auctions, The MIT
Press, 2005.
[8] A. Das and D. Grosu, “Combinatorial auction-based protocols for resource
allocation in grids,” Parallel and Distributed Processing Symposium, 2005.
Proceedings. 19th IEEE International, 2005.
[9] A. Marshall, Principles of Economics (Great Minds Series), Prometheus Books,
1997.
Chapter 7 Bibliography 235
[10] “Market,” From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Market.113
[11] D. Friedman, “The double auction market institution: A survey,” The Double
Auction Market: Institutions, Theories, And Evidence, J. Rust, ed., Westview Press,
1993, pp. 3-26.
[12] R. Buyya, D. Abramson, J. Giddy, and H. Stockinger, “Economic models for
resource management and scheduling in Grid computing,” Concurrency and
Computation: Practice and Experience, vol. 14, 2002, pp. 1507-1542.
[13] Y. Shoham and K. Leyton-Brown, Multiagent systems: Algorithmic, game-
theoretic, and logical foundations, Cambridge Univ Pr, 2009.
[14] D.S. Diamond and L.L. Selwyn, “Considerations for computer utility pricing
policies,” Proceedings of the 1968 23rd ACM national conference, New York, New
York, USA: ACM Press, 1968, pp. 189-200.
[15] I.E. Sutherland, “A futures market in computer time,” Communications of the
ACM, vol. 11, Jun. 1968, pp. 449-451.
[16] R. Buyya, D. Abramson, and S. Venugopal, “The Grid Economy,” Proceeding of
the IEEE, vol. 93, Mar. 2005, pp. 698-714.
[17] C.S. Yeo and R. Buyya, “A taxonomy of market-based resource management
systems for utility-driven cluster computing,” Software: Practice and Experience, vol.
36, Nov. 2006, pp. 1381-1419.
[18] R. Buyya and M. Murshed, “GridSim: a toolkit for the modeling and simulation
of distributed resource management and scheduling for Grid computing,”
Concurrency and Computation: Practice and Experience, vol. 14, Nov. 2002, pp.
1175-1220.
Chapter 7 Bibliography 236
[19] R. Buyya, R. Ranjan, and R.N. Calheiros, Modeling and simulation of scalable
Cloud computing environments and the CloudSim toolkit: Challenges and
opportunities, IEEE, 2009.
[20] C.A. Waldspurger, T. Hogg, B.A. Huberman, J.O. Kephart, and W.S. Stornetta,
“Spawn: A Distributed Computational Economy,” IEEE Transactions on Software
Engineering, vol. 18, Feb. 1992, pp. 103-117.
[21] N. Nisan, S. London, O. Regev, and N. Camiel, “Globally distributed
computation over the Internet-the POPCORN project,” Proceedings. 18th.
[22] Lewis, Grace. Cloud Computing: Finding the Silver Lining, Not the Silver
Bullet. http://www.sei.cmu.edu/newsitems/cloudcomputing.cfm, 2009.
[23] Dormann, Will & Rafail, Jason. Securing Our Web Browser.
http://www.cert.org/tech_tips/securing_browser, 2006.
[24] Jansen, Wayne & Grance, Timothy. Guidelines on Security and Privacy in Public
Cloud Computing. National Institute of Standards and Technology, 2011.
[25] Strowd, Harrison & Lewis, Grace. T-Check in System-of-Systems Technologies:
Cloud Computing (CMU/SEI-2010-TN-009). Software Engineering Institute,
Carnegie Mellon University, 2010. http: //www.sei.cmu.edu /library /abstracts /reports
/10tn009.cfm
[26] Lewis, Grace. Basics About Cloud Computing.
http://www.sei.cmu.edu/library/abstracts/whitepapers/cloudcomputingbasics.cfm
2010.
[27] Clash of the Clouds. The Economist October 15, 2009.
http://www.economist.com/displaystory.cfm?story_id=14637206 (accessed
November 15, 2009).
http://www.sei.cmu.edu/library/abstracts/reports/10tn009.cfmhttp://www.sei.cmu.edu/library/abstracts/reports/10tn009.cfm
Chapter 7 Bibliography 237
[28] Proffitt, A. Pharma’s Early Cloud Adopters. BioIT World, November/December
2009, pp.31-32.
[29] Microsoft Sidekick users lose data. n
http://www.telegraph.co.uk/technology/microsoft/6316609/Microsoft-Sidekick-users-
lose-data.html (accessed November 28, 2009)
[30] Farber, R. Cloud Computing: Pie in the Sky? ScientificComputing.com,
November/December 2009
[31] H.Erdogmous, 2009. “Cloud Computing: Does nirvana hide behindthe Nebula?”
IEEE Software, vol 26.
[32] D.Boneh, 2008. “Generalization Identity based and broadcast encryption
achemes”. Vol 5350.
[33] Richard Chow, Phillepe Goel. “Controlling data in the cloud” Foster, I., Zhau,
Y., Ioan, R., & Lu, S. “Cloud Computing and Grid Computing 360-Degree
Compared.” Grid Computing Environments Workshop, 2008.2
.http://ieeexplore.ieee.org/xpls/abs_all.jsp? arnumber=4738445
[34] Grossman, R. “The Case for Cloud Computing.” ITPro 11, 2 (March/April
2009): 23-27.
[35] Amazon Elastic Compute Cloud (EC2). http://aws.amazon.com/ec2/.
[36] Amazon Virtual Private Cloud. http://aws.amazon.com/vpc/.
[37] Amazon Web Services: Overview of Security Processes, White Paper.
http://aws.amazon.com/security.
[38] Animoto - Scaling Through Viral Growth. http:
//aws.typepad.com/aws/2008/04/animoto---scali.html.
Chapter 7 Bibliography 238
[39] DB2 for z/OS Performance Monitoring and Tuning Guide.
http://publib.boulder.ibm.com/infocenter/dzichelp/v2r2/topic/com.ibm.db29.doc.perf/
dsnpfk17.pdf.
[40] IBM ILOG CPLEX. http://www-01.ibm.com/software/ integration/ optimization/
cplex/.
[41] IBM Service Management Tivoli Application Dependency Discovery Manager
Software. http: //www-01.ibm.com/software/tivoli/products/taddm/.
[42] Microsoft Windows Azure. http://www.microsoft.com/windowsazure/.
[43] Riverbed Technology. http://www.riverbed.com/.
[44] SQL Azure Firewall. http: //msdn.microsoft.com/en-us/library/ee621782.aspx.
[45] The Case Against Cloud Computing. http://www.cio.com/article/477473/.
[46] Websphere application server performance monitoring infrastructure (pmi).
http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.web
sphere.express.doc/info/exp/ae/cprf_pmi_arch.html.
[47] M. K. Aguilera, J. C. Mogul, J. L. Wiener, P. Reynolds, and A. Muthitacharoen.
Performance Debugging for Distributed Systems of Black Boxes. In Proc.SOSP,
2003.
[48] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G.
Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A
Berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS
Department, University of California, Berkeley, Feb 2009.
Chapter 7 Bibliography 239
[49] Arthur Cole. The Future Belongs to Hybrid Clouds.
http://www.itbusinessedge.com/cm/blogs/cole/the-future-belongs-to-hybrid-
louds/?cs=30482.
[50] T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to
Algorithms. McGraw-Hill Higher Education, 2001.
[51] D. Gottfrid. The New York Times Archives + Amazon Web Services =
TimesMachine. http://open.blogs.nytimes.com/2008/05/21/.
[52] J. Hamilton. The Cost of Latency. http://perspectives.mvdirona
com/2009/10/31/TheCostOfLatency.aspx, Oct. 2009.
[53] L. E. Li, M. F. Nowlan, C. Tian, Y. R. Yang, and M. Zhang. Mosaic: Policy
Homomorphic Network Extension. Technical Report YALEU/DCS/TR-1427,
CS Department, Yale University, Feb 2010.
[54] M. Tawarmalani and N. V. Sahinidis. Global optimization of mixed-integer
nonlinear programs: A theoretical and computational study. Mathematical
Programming, 99(3):563–591, 2004.
[55] K. Magoutis, M. Devarakonda, and K. Muniswamy-Reddy. Galapagos:
Automatically Discovering Application-Data Relationships in Networked Systems. In
Proc. IM, 2007.
[56] M. O’Neill. Connecting to the cloud. http:
//www.ibm.com/developerworks/library/x-cloudpt1/.
[57] K. Sripanidkulchai, S. Sahu, Y. Ruan, A. Shaikh, and C. Dorai. Are Clouds
Ready for Large Distributed Applications? In Proc. SOSP LADIS Workshop, 2009.
[58] Y.-W. E. Sung, S. G. Rao, G. G. Xie, and D. A. Maltz. Towards systematic
design of enterprise networks. In Proc. CoNEXT, 2008.
Chapter 7 Bibliography 240
[59] Symantec. 2010 State of the Data Center Global Data.
http://www.symantec.com/content/en/us/about/media/pdfs/Symantec_DataCenter10_
Report_Global.pdf.
[60] B. Urgaonkar, G. Pacifici, P. J. Shenoy, M. Spreitzer, and A. N. Tantawi. An
analytical model for multi-tier internet services and its applications. In Proc.
SIGMETRICS, 2005.
[61] B. Urgaonkar, P. Shenoy, A. Chandra, and P. Goyal. Dynamic Provisioning of
Multi-tier Internet Applications. In Proc. ICAC, 2005.
[62] T. Wood, P. Shenoy, A. Gerber, K. Ramakrishnan, and J. V. der Merwe. The
Case for Enterprise-Ready Virtual Private Clouds. In Proc. HotCloud Workshop,
2009.
[63] G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, G. Hjalmtysson, and J.
Rexford. On static reachability analysis of IP networks. In Proc. INFOCOM, 2005.
[64] D. Agrawal, A. El Abbadi, S. Antony, and S. Das. Data Management Challenges
in Cloud Computing Infrastructures. In DNIS, pages 1–10, 2010. 3
[65] M. Armbrust, A. Fox, D. A. Patterson, N. Lanham, B. Trushkowsky, J. Trutna,
and H. Oh. SCADS: Scale Independent Storage for Social Computing Applications.
In CIDR Perspectives, 2009. 11
[66] S. Aulbach, T. Grust, D. Jacobs, A. Kemper, and J. Rittinger. Multi-tenant
databases for software as a service: schema-mapping techniques. In SIGMOD, pages
1195–1206, 2008. 1, 2, 11
[67] F. R. Bach and M. I. Jordan. Kernel independent component analysis. J. Mach.
Learn. Res., 3:1–48, 2003. 14
Chapter 7 Bibliography 241
[68] M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska. Building a
database on S3. In SIGMOD, pages 251–264, 2008. 11
[69] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T.
Chandra, A. Fikes, and R. E. Gruber. Bigtable: A Distributed Storage System for
Structured Data. In OSDI, pages 205–218, 2006. 2, 3, 8, 11
[70] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A.
Warfield. Live migration of virtual machines. In NSDI, pages 273–286, 2005. 2, 4,
11, 14
[71] B. F. Cooper, R. Ramakrishnan, U. Srivastava, A. Silberstein, P. Bohannon, H.-
A. Jacobsen, N. Puz, D. Weaver, and R. Yerneni. PNUTS: Yahoo!’s hosted data
serving platform. Proc. VLDB Endow., 1(2):1277–1288, 2008. 2, 3, 11
[72] B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears.
Benchmarking Cloud Serving Systems with YCSB. In ACM SoCC, pages 143–154,
2010. 2, 9, 10
[73] C. Curino, E. Jones, Y. Zhang, E. Wu, and S. Madden. Relational Cloud: The
Case for a Database Service. Technical Report 2010-14, CSAIL, MIT, 2010. 4, 11
url: https://en.wikipedia.org/wiki/High-net-worth_individual
[74] S. Das, S. Agarwal, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic,
Scalable, and Self Managing Transactional Database for the Cloud. Technical Report
2010-04, CS, UCSB, 2010. http://www.cs.ucsb.edu/research/tech_reports/.1, 2, 7, 8,
9, 11
[75] S. Das, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic Transactional Data
Store in the Cloud. In USENIX HotCloud, 2009. 2
Chapter 7 Bibliography 242
[76] S. Das, D. Agrawal, and A. El Abbadi. G-Store: A Scalable Data Store for
Transactional Multi key Access in the Cloud. In ACM SoCC, pages 163–174, 2010.
3, 11
[77] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin,
S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: Amazon’s highly
available key-value store. In SOSP, pages 205–220, 2007. 1, 2, 3, 11
[78] D. J. Dewitt, S. Ghandeharizadeh, D. A. Schneider, A. Bricker, H. I. Hsiao, and
R. Rasmussen. The Gamma Database Machine Project. IEEE Trans. on Knowl. and
Data Eng., 2(1):44–62, 1990.
[79] A. Elmore, S. Das, D. Agrawal, and A. El Abbadi. Who’s Driving this Cloud?
Towards Efficient Migration for Elastic and Autonomic Multitenant Databases.
Technical Report 2010-05, CS, UCSB, 2010. http://www.cs.ucsb.edu/ research/ tech_
reports/.9, 11
[80] K. P. Eswaran, J. N. Gray, R. A. Lorie, and I. L. Traiger. The notions of
consistency and predicate locks in a database system. Commun. ACM, 19(11):624–
633, 1976. 14
[81] Facebook Statistics. http://www.facebook.com/press/info.php?statistics,
Retreived July 23, 2010. 1
[82] A. Ganapathi, H. A. Kuno, U. Dayal, J. L. Wiener, A. Fox, M. I. Jordan, and D.
A. Patterson. Predicting multiple metrics for queries: Better decisions enabled by
machine learning. In ICDE, pages 592–603, 2009. 14
[83] J. Gray. Notes on data base operating systems. In Operating Systems, An
Advanced Course, pages 393–481, London, UK, 1978. Springer-Verlag. 5, 6
[84] J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques.
Morgan Kaufmann Publishers Inc., 1992. 4
Chapter 7 Bibliography 243
[85] P. Helland. Life beyond Distributed Transactions: An Apostate’s Opinion. In
CIDR, pages 132–141, 2007. 3
[86] P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. ZooKeeper: Wait-free
Coordination for Internet-scale Systems. In USENIX Annual Technical Conference,
2010. 8, 9
[87] D. Jacobs and S. Aulbach. Ruminations on multi-tenant databases. In BTW,
pages 514–521, 2007. 1, 2, 3, 11
[88] T. Kraska, M. Hentschel, G. Alonso, and D. Kossmann. Consistency Rationing in
the Cloud: Pay only when it matters. PVLDB, 2(1):253–264, 2009. 11, 12
[89] H. T. Kung and J. T. Robinson. On optimistic methods for concurrency control.
ACM Trans. Database Syst., 6(2):213–226, 1981. 4, 8, 14
[90] H. Liu, H. Jin, X. Liao, L. Hu, and C. Yu. Live migration of virtual machine
based on full system trace and replay. In HPDC, pages 101–110, 2009. 11
[91] D. B. Lomet, A. Fekete, G. Weikum, and M. J. Zwilling. Unbundling transaction
services in the cloud. In CIDR Perspectives, 2009. 3, 11
[92] J. B. Rothnie Jr., P. A. Bernstein, S. Fox, N. Goodman, M. Hammer, T. A.
Landers, C. L. Reeve, D. W. Shipman, and E. Wong. Introduction to a System for
Distributed Databases url: http://www.codeproject.com/Articles/49662/cloud-
computing-SaaS (SDD-1). ACM Trans. Database Syst., 5(1):1–17, 1980. 11
[93] G. H. Sockut and B. R. Iyer. Online reorganization of databases. ACM Comput.
Surv., 41(3):1–136, 2009. 11
[94] A. A. Soror, U. F. Minhas, A. Aboulnaga, K. Salem, P. Kokosielis, and S.
Kamath. Automatic virtual machine configuration for database workloads. In
SIGMOD, pages 953–966, 2008. 1, 2, 11
Chapter 7 Bibliography 244
[95] The Transaction Processing Performance Council. TPC-C benchmark (Version
5.10.1), 2009. 2, 9, 10
[96] C. D. Weissman and S. Bobrowski. The design of the force.com multitenant
internet application development platform. In SIGMOD, pages 889–896, 2009. 1, 2,
11
[97] F. Yang, J. Shanmugasundaram, and R. Yerneni. A scalable data platform for a
large number of small applications. In CIDR, 2009
[98] J. Baker, C. Bond, J. Corbett, J. Furman, A. Khorlin, J. Larson, J.-M. Leon, Y.
Li, A. Lloyd, and V. Yushprakh. Megastore: Providing Scalable, Highly Available
Storage for Interactive Services. In CIDR, pages 223–234, 2011.
[99] H. Berenson, P. Bernstein, J. Gray, J. Melton, E. O’Neil, and P. O’Neil. A
critique of ANSI SQL isolation levels. In SIGMOD, pages 1–10, 1995.
[100] P. A. Bernstein, I. Cseri, N. Dani, N. Ellis, A. Kalhan, G. Kakivaya, D. B.
Lomet, R. Manner, L. Novik, and T. Talius. Adapting Microsoft SQL Server for
Cloud Computing. In ICDE, 2011.
[101] P. A. Bernstein and E. Newcomer. Principles of Transaction Processing.
Morgan Kaufmann Publishers Inc., second edition, 2009.
[102] R. Bradford, E. Kotsovinos, A. Feldmann, and H. Schiöberg. Live wide-area
migration of virtual machines including local persistent state. In VEE, pages 169–179,
2007.
[103] M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska. Building a
database on S3. In SIGMOD, pages 251–264, 2008.
Chapter 7 Bibliography 245
[104] S. Chandrasekaran and R. Bamford. Shared cache – the future of parallel
databases. In ICDE, pages 840–850, 2003.
[105] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A.
Warfield. Live migration of virtual machines. In NSDI, pages 273–286, 2005.
[106] B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears.
Benchmarking Cloud Serving Systems with YCSB. In ACM SoCC, pages 143–154,
2010.
[107] C. Curino, E. Jones, R. Popa, N. Malviya, E. Wu, S. Madden, H. Balakrishnan,
and N. Zeldovich. Relational Cloud: A Database Service for the Cloud. In CIDR,
pages 235–240, 2011.
[108] S. Das, S. Agarwal, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic,
Scalable, and Self Managing Transactional Database for the Cloud. Technical Report
2010-04, CS, UCSB, 2010.
[109] S. Das, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic Transactional Data
Store in the Cloud. In USENIX HotCloud, 2009.
[110] S. Das, S. Nishimura, D. Agrawal, and A. El Abbadi. Live Database Migration
for Elasticity in a Multitenant Database for Cloud Platforms. Technical Report 2010-
09, CS, UCSB, 2010.
[111] K. P. Eswaran, J. N. Gray, R. A. Lorie, and I. L. Traiger. The notions of
consistency and predicate locks in a database system. Commun. ACM, 19(11):624–
633, 1976.
[112] Facebook Statistics. http://www.facebook.com/press/info.php?statistics,
Retreived March 18, 2010.
Chapter 7 Bibliography 246
[113] J. Gray. Notes on data base operating systems. In Operating Systems, An
Advanced Course, pages 393–481, London, UK, 1978. Springer-Verlag.
[114] J. N. Gray, R. A. Lorie, and G. R. Putzolu. Granularity of locks in a shared data
base. In VLDB, pages 428–451, 1975.
[115] H2 Database Engine. http://www.h2database.com/html/main.html, 2011.
[116] D. Jacobs and S. Aulbach. Ruminations on multi-tenant databases. In BTW,
pages 514–521, 2007.
[117] H. Liu, H. Jin, X. Liao, L. Hu, and C. Yu. Live migration of virtual machine
based on full system trace and replay. In HPDC, pages 101–110, 2009.
[118] D. B. Lomet. Replicated indexes for distributed data. In PDIS, pages 108–119.
IEEE Computer Society, 1996.
[119] D. B. Lomet, A. Fekete, G. Weikum, and M. J. Zwilling. Unbundling
transaction services in the cloud. In CIDR, 2009.
[120] C. Mohan, D. Haderle, B. Lindsay, H. Pirahesh, and P. Schwarz. Aries: a
transaction recovery method supporting fine-granularity locking and partial rollbacks
using write-ahead logging. ACM TODS, 17(1):94–162, 1992.
[121] A. A. Soror, U. F. Minhas, A. Aboulnaga, K. Salem, P. Kokosielis, and S.
Kamath. Automatic virtual machine configuration for database workloads. In
SIGMOD, pages 953–966, 2008.
[122] C. D. Weissman and S. Bobrowski. The design of the force.com multitenant
internet application development platform. In SIGMOD, pages 889–896, 2009.
[123] F. Yang, J. Shanmugasundaram, and R. Yerneni. A scalable data platform for a
large number of small applications. In CIDR 2009
Chapter 7 Bibliography 247
[124] McKinsey & Co. Report presented at Uptime Institute Symposium April 18,
2009. Clearing the Air on Cloud Computing. http://uptimeinstitute.org/
content/view/353/319;http://images.cxotoday.com/cxoimages/storyimagesmatter1011
57 .pdf (accessed November 27, 2009).
[125] Traian Andrei & Prof. Raj Jain, Cloud Computing Challenges and Related
Security Issues, url: http://www.cse.wustl.edu/~jain/cse571-09/index.html April 30,
2009
[126] Alistair Croll, "Why Cloud Computing Needs Security", 2008 url:
http://gigaom.com/2008/06/10/the-amazon-outage-fortresses-in-the-clouds/
[127 Jonothan Erickson, "Best Practices for Protecting Data in the Cloud", 2008
http://www.ddj.com/security/210602698
[128] Jon Brodkin, "Seven Cloud-Computing Security Risks", 2008
http://www.networkworld.com/news/2008/070208-cloud.html
[129] Elinor Mills, "Cloud Computing Security Forecast: Clear Skies", 2009
http://news.zdnet.com/2100-9595_22-264312.html
[130] Geva Perry, "How Cloud & Utility Computing Are Different", 2008
http://gigaom.com/2008/02/28/how-cloud-utility-computing-are-different/
[131] Neil Wienberg, "Cloudy picture for cloud computing", 2008
http://www.networkworld.com/news/2008/043008-interop-cloudcomputing.html
[132] Ephraim Schwartz, "Hybrid model brings security to the cloud", 2008
http://www.infoworld.com/d/cloud-computing/hybrid-model-brings-security-cloud-
364
[133] The Open Cloud Consortium, 2008
Chapter 7 Bibliography 248
http://www.opencloudconsortium.org/index.html
[134] Open Security Architecture, 2009 http://www.opensecurityarchitecture.org/cms/
[135] Paul Jaeger, Jimmy Lin, Justin Grimes, "Cloud Computing and Information
Policy", March 2008
[136] Shivlal Mewada, Umesh kumar Singh and Pradeep Sharma, Security Based
Model for Cloud Computing IRACST – International Journal of Computer Networks
and Wireless Communications (IJCNWC), Vol. 1, No. 1, December 2011
[137] Ricardo vilaca, Rui oliveira 2009. Clouder: A Flexible Large Scale
Decentralized Object Store. Architecture Overview. Proceeding of WDDDM ’09
[138] Michael Miller. Cloud Computing-Web Based Application that change the way
you collaborate online. Publishing of QUE, 2nd print. 2009
[139] National Institute Of Standard and technology.csrc.nist.gov/groups/ SNS/cloud-
computing/cloud-def-v15.doc, 2009
[140] Open Security Architecture http://www.opensecurityarchitecture.org/
[141] Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy :
An Enterprise perspective of Risks
[142] GregBoss, Padma Malladi, Dennis Quan, Linda Legregni and Harold hall
Cloud Computing. Available from www.ibm.com/developerworks/ websphere/ zones
/hipods/, 2007.
[143] Anthony T.Velte, Toby J.Velte and Robert Elsenpeter. Cloud Computing- A
Practical Approach. Publishing of Tata McGRAW Hill, 2010
Chapter 7 Bibliography 249
[144] Saurabh Kumar. Security Issues In Cloud Computing. Available
fromserl.iiit.ac.in/cs6600/saurabh.ppt.
[145] Krešimir Popović, Željko Hocenski,” Cloud computing security issues and
challenges”, MIPRO 2010, May 24-28, 2010
[146] Gartner: Seven cloud-computing security risks, 02 July 2008,
http://www.infoworld.com/d/security-central/gartnersevencloud-computing-security-
risks-853
[147] Wikipedia, 6 February 2010, http://en.wikipedia.org/wiki/Risk_management
[148] Wikipedia, 27 January 2010, http://en.wikipedia.org/wiki/Risk_assessment
[149] D. Catteddu, Giles Hogben: European Network and Information Security
Agency, November 2009.
http://www.enisa.europa.eu/act/rm/ files/deliverables/ cloud computing-risk-
assessment
[150] P Mell, K Scarfone, S Romanosky - Published by FIRST-Forum of Incident,
June 2007.
[151] Mike Schiffman, Gerhard Eschelbeck, David Ahmad, Andrew Wright, Sasha
Romanosky, "CVSS: A Common Vulnerability Scoring System", National
Infrastructure Advisory Council (NIAC), 2004.
[152] Microsoft Corporation. Microsoft Security Response Center Security Bulletin
Severity Rating System. November 2002.
http://www.microsoft.com/technet/security/bulletin/rating.mspx.
[153] United States Computer Emergency Readiness Team (US-CERT). US-CERT
Vulnerability Note Field Descriptions. 2006.
http://www.kb.cert.org/vuls/html/fieldhelp.
http://scholar.google.co.in/citations?user=8qgO4BEAAAAJ&hl=en&oi=sra
Chapter 7 Bibliography 250
[154] SANS Institute. SANS Critical Vulnerability Analysis Archive. Undated,2007.
http://www.sans.org/newsletters/cva/.
[155] Arnold, John. “Domain 10: Guidance for Application Security V2.1.” Cloud
Security Alliance, July 2010
http://www.cloudsecurityalliance.org/guidance/csaguidedom10-v2.10.pdf,
[156] Badger, Lee, and Tim Grance. “Standards Acceleration to Jumpstart Adoption
of Cloud Computing.” NIST Computer Security Division Briefing, May 20, 2010 at:
http://www.slideshare.net/kvjacksn/nist-cloud-computingforumbadgergrance.
[157] Baldor, Lolita C. “Pentagon spends $100M to fix Cyber Attacks.” Physorg.com,
April 7,2009
http://www.physorg.com/news158333019.html.
[158] Beckman, Mel. “Cloud Options that IT will Love.” An Interactive eBook:
Cloud Computing, July 15, 2010
http://www.networkworld.com/whitepapers/nww/pdf/eGuide_cloud_5brand_final.pdf
.
[159]Biscotti, Fabrizio, Benoit J. Lheureux, Andrew Frank, Jeffrey Roster, Susan
Cournoyer, and Venecia K. Liu. “Forecast: Public Cloud Services, Worldwide and
Regions, Industry Sectors, 2009-2014.” Gartner, Inc., June 2, 2010,
http://www. gartner.com/DisplayDocument?ref=clientFriendlyUrl&id=1378513
[160] Bolin, Jason S. Use Case Analysis for Adopting Cloud Computing in Army
Test and Evaluation. Naval Postgraduate School Master’s Thesis, September 2010
http://edocs.nps.edu/npspubs/scholarly/theses/2010/Sep/10Sep_Bolin.pdf
[161] Brodkin, Jon. “Gartner: Seven cloud computing security risks.” Infoworld, July
2, 2008
http://www.infoworld.com/d/security-central/gartner-seven-cloud-computingsecurity-
risks-853.
Chapter 7 Bibliography 251
[162] Brunette, Glenn and Rich Mogull, “Security Guidance for Critical Areas of
Focus in Cloud Computing, V2.1.” Cloud Security Alliance, December 2009,
at: http://www.cloudsecurityalliance.org/csaguide.pdf.
[163] Carey, Allan. “Cloud Assurance Still Missing,” Information Assurance
Newsletter, Vol. 13, No. 1, 2010.
[164] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G.
Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds: A
Berkeley View of Cloud Computing, 2009.
[165] “Microsoft Windows Azure” http://www.microsoft.com/windowsazure/.
[166] “Google App Engine” http://code.google.com/appengine/.
[167] I. Foster and C. Kesselman, “The grid: blueprint for a new computing
infrastructure,” Oct. 1998.
[168] S. Clearwater, Market-Based Control: A Paradigm for Distributed Resource
Allocation, World Scientific, 1996.
[169] J. Shneidman, C. Ng, D.C. Parkes, A. AuYoung, A.C. Snoeren, A. Vahdat, and
B. Chun, “Why Markets Could (But Don’t Currently) Solve Resource Allocation
Problems in Systems,” Challenges, 2005
[170] P. Cramton, Y. Shoham, and R. Steinberg, Combinatorial Auctions, The MIT
Press, 2005.
[171] A. Das and D. Grosu, “Combinatorial auction-based protocols for resource
allocation in grids,” Parallel and Distributed Processing Symposium, 2005.
Proceedings. 19th
IEEE International, 2005.
Chapter 7 Bibliography 252
[172] A. Marshall, Principles of Economics (Great Minds Series), Prometheus Books,
1997.
[173] “Market,” From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Market.
[174] D. Friedman, “The double auction market institution: A survey,” The Double
Auction Market: Institutions, Theories, And Evidence, J. Rust, ed., Westview Press,
pp. 3-26, 1993
[175] R. Buyya,D. Abramson, J. Giddy, and H. Stockinger, “Economic models for
resource management and scheduling in Grid computing,” Concurrency and
Computation: Practice and Experience, pp. 1507-1542, vol. 14, 2002.
[176] Y. Shoham and K. Leyton-Brown, Multiagent systems: Algorithmic,
game-theoretic, and logical foundations, Cambridge Univ Pr, 2009.
[177] D.S. Diamond and L.L. Selwyn, “Considerations for computer utility pricing
policies,” Proceedings of the 1968 23rd ACM national conference, New York,
New York, USA: ACM Press, pp. 189-200, 1968
[178] I.E. Sutherland, “A futures market in computer time,” Communications of the
ACM, vol. 11, pp. 449-451, Jun. 1968
[179] R. Buyya, D. Abramson, and S. Venugopal, “The Grid Economy,” Proceedings
of the IEEE, vol. 93, pp. 698-714, Mar. 2005
[180] C.S. Yeo and R. Buyya, “A taxonomy of market-based resource management
systems for utility-driven cluster computing,” Software: Practice and Experience, vol.
36, pp. 1381-1419, Nov. 2006
[181] R. Buyya and M. Murshed, “GridSim: a toolkit for the modeling and simulation
of distributed resource management and scheduling for Grid computing,”
Chapter 7 Bibliography 253
Concurrency and Computation: Practice and Experience, vol. 14, pp. 1175-1220, Nov.
2002
[182] R. Buyya, R. Ranjan, and R.N. Calheiros, Modeling and simulation of scalable
Cloud computing environments and the CloudSim toolkit: Challenges and
opportunities, IEEE, 2009.
[183] C.A. Waldspurger, T. Hogg, B.A. Huberman, J.O. Kephart, and W.S. Stornetta,
“Spawn: A Distributed Computational Economy,” IEEE Transactions on Software
Engineering, pp. 103-117, vol. 18, Feb. 1992
[184] U.S. Interagency OPSEC Support Staff, OPSEC Glossary of Terms available
from http://www.ioss.gov/docs/definitions.html; Internet, accessed 18 October 2005
[183] Sun Microsystems, Introduction to Cloud Computing Architecture, 2009
[184] Fellows, W. Partly Cloudy, Blue-Sky Thinking About Cloud Computing. 451
Group, 2008
[185] Varia, J. Cloud Architectures. Amazon Web Services, 2009.
[186] Chappell, D. Introducing the Azure Services Platform. David Chappell &
Associates, 2009
[187] Rayport, J. F. And Heyward, A. Envisioning the Cloud: The Next Computing
Paradigm. Market space, 2009.
[188] Pastaki Rad, M., Sajedi Badashian, A., Meydanipour, G., Ashurzad Delcheh,
M., Alipour, M. And Afzali, H. A Survey Of Cloud Platforms and Their Future, 2009.
[189] Khajeh-Hosseini, A., Sommerville, I. And Sriram, I. "Research Challenges for
Enterprise Cloud Computing," (unpublished).( Submitted to 1st ACM
Chapter 7 Bibliography 254
Symposium on Cloud Computing, Indianapolis, Indiana, USA, under paper id 54,
June 2010
[190] IBM, Staying aloft in tough times, 2009
[191] Plummer, D.C., Bittman , T.J., Austin, T., Cearley, D.W., And Smith D.M.,
Cloud Computing: Defining And Describing An Emerging Phenomenon , 2008
[192] Staten, J., Is Cloud Computing Ready For The Enterprise?, 2008.
[193] Mell, P. And Grance, T. 2009. Draft Nist Working Definition Of Cloud
Computing.
[194] Erdogmus, H. Cloud Computing: Does Nirvana Hide Behind The Nebula?
Software, IEEE 26, 2, 4-6, 2009
[195] Lemos, R. 2009. Inside One Firm's Private Cloud Journey. Retrieved December
1, 2009, from http://www.cio.com/article/506114/Inside_One_Firm_s_Pri
vate_Cloud_Journey
[196] Open CirrusTM: the HP/Intel/Yahoo! Open Cloud Computing Research
Testbed. Retrieved December 1, 2009, from https://opencirrus.org/
[197] Vaquero, L., Merino, L., Caceres, J. And Lindner, M. A break in the clouds:
towards a cloud definition. SIGCOMM Comput. Commun. Rev. 39, 1, 50-55, 2009.
[198] Youseff, L., Butrico, M. And Da Silva, D. 2008. Toward a Unified Ontology of
Cloud Computing. In Grid Computing Environments Workshop, GCE '08, 1-10,
2008.
[199] J. Appavoo, V. Uhlig, and A. Waterland, "Project Kittyhawk: Building a
Global-Scale Computer," vol. 42, pp. pp. 77-84, , 2008
Chapter 7 Bibliography 255
[200] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D.
Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds: A Berkeley View
of Cloud Computing, 2009.
[201] Weinman, J. 10 Reasons Why Telcos Will Dominate Enterprise Cloud
Computing, 2008
[202] Voas, J. And Zhang, J. Cloud Computing: New Wine Or Just A New Bottle? IT
Professional 11, 2, 15-17, 2009.
[203]Vouk, M. A. 2008. Cloud computing — Issues, research and
implementations. In Information Technology Interfaces, ITI 2008. 30th International
Conference on, 31-40, 2008.
[204] Foster, I., Zhao, Y., Raicu, I. And Lu, S. 2008. Cloud Computing and Grid
Computing 360-Degree Compared. In Grid Computing Environments Workshop
(GCE '08), Austin, Texas, USA, November 2008.
[205] Corbató, F. J., Saltzer, J. H., and Clingen, C. T. 1972. Multics: the first seven
years. In Proceedings of the May 16-18, 1972, Spring Joint Computer Conference,
Atlantic City, New Jersey, 571-583, May 1972
[206] Buyya, R., Yeo, C. And Venugopal, S. 2008. Market-Oriented Cloud
Computing: Vision, Hype, and Reality for Delivering IT Services as Computing
Utilities. In High Performance Computing and Communications. HPCC '08. 10th
IEEE International Conference on, 5-13, 2008
[207] Chang, M., He, J., And E. Leon, "Service-Orientation in the Computing
Infrastructure," pp. 27-33, 2006.
[208] Sedayao, J. Implementing And operating an internet scale distributed
application using service oriented architecture principles and cloud computing
Chapter 7 Bibliography 256
infrastructure. In iiWAS '08: Proceedings of the 10th International Conference on
Information Integration and Web-based Applications & Services, 417-421, 2008
[209] Zhang, L. And Zhou, Q. Ccoa: Cloud Computing Open Architecture. In Web
Services, 2009. ICWS 2009. IEEE International Conference on, 607-616, 2009
[210] Napper, J. And Bientinesi, P. Can cloud computing reach the top500? In
UCHPC-MAW '09: Proceedings of the combined workshops on UnConventional high
performance computing workshop plus memory access workshop, 17-20, 2009
[211] Birman, K., Chockler, G., and van Renesse, R. Toward a cloud computing
research agenda. SIGACT News, 40, 2, 68-80, 2009
[212] Keahey, K., Tsugawa, M., Matsunaga, A. And Fortes, J. Sky Computing.
Internet Computing, IEEE 13, 5, 43-51, 2009
[213] Ohlman, B., Eriksson, A. And Rembarz, R. 2009. What Networking of
Information Can Do for Cloud Computing. In Enabling Technologies: Infrastructures
for Collaborative Enterprises. WETICE '09. 18th IEEE International Workshops on,
78-83, 2009
[214] Matthews, J., Garfinkel, T., Hoff, C. And Wheeler, J.. Virtual machine contracts
for datacenter and cloud computing environments. In ACDC'09: Proceedings of the
1st workshop on Automated control for datacenters and clouds, 25-30, 2009
[215] Lim, H., Babu, S., Chase, J. And Parekh, S. Automated Control In Cloud
computing: challenges and opportunities. In ACDC '09: Proceedings of the 1st
workshop on Automated control for datacenters and clouds, 13-18., 2009
[216] Mikkilineni, R. And Sarathy, V. Cloud Computing and the Lessons from the
Past. In Enabling Technologies: Infrastructures for Collaborative Enterprises.
WETICE '09. 18th IEEE International Workshops on, 57-62, 2009
Chapter 7 Bibliography 257
[217] Grossman, R. L. The Case For Cloud Computing. It Professional 11, 2, 23-27.
2009
[218] Sotomayor, B., Rubã©, A., Llorente, I. And Foster, I.. Virtual Infrastructure
Management In Private And Hybrid Clouds. Internet Computing, Ieee 13, 5, 14-22,
2009
[219] Song, S., Ryu, K. And Da Silva, D. 2009. Blue Eyes: Scalable And Reliable
System Management For Cloud Computing. In Parallel & Distributed Processing,
Ipdps 2009. Ieee International Symposium On, 1-8, 2009.
[220] Vishwanath, K., Greenberg, A. And Reed, D. Modular Data Centers: How To
Design Them? 2009
[221] Sriram, I. 2009. A Simulation Tool Exploring Cloudscale Data Centres. In 1st
International Conference On Cloud Computing, Pp. 381-392, 2009
[222] Buyya, R., Ranjan, R. And Calheiros, R. N. 2009. Modeling And Simulation Of
Scalable Cloud Computing Environments And The Cloudsim Toolkit: Challenges
And Opportunities. In High Performance Computing & Simulation. Hpcs '09.
International Conference On, 1-11, 2009
[223] H. Abdelsalam, K. Maly, R. Mukkamala, M. Zubair, And D. Kaminsky,
"Towards Energy Efficient Change Management In A Cloud Computing
Environment," Pp. 161-166, 2009
[224] Chun, B.-G. And Maniatis, P. Augmented Smart Phone Applications Through
Clone Cloud Execution. In Proceedings Of The 12th Workshop On Hot Topics In
Operating Systems (Hotos Xii), 2009
[225] Ganon, Z. And Zilbershtein, I. E. Cloud-Based Performance Testing Of
Network Management Systems. In Computer Aided Modeling And Design Of
Chapter 7 Bibliography 258
Communication Links And Networks, Camad '09. Ieee 14th International Workshop
On, 1-6, 2009.
[226] Mathew, R. And Spraetz, R. Test Automation On A Saas Platform. In Software
Testing Verification And Validation, 2009. Icst '09. International Conference On,
317-325. 2009
[227] Wilson, M. Constructing And Managing Appliances For Cloud Deployments
From Repositories Of Reusable Components. 2009
[228] Mei, L., Chan, W. K. And Tse, T. H. A Tale Of Clouds: Paradigm Comparisons
And Some Thoughts On Research Issues. In Asia-Pacific Services Computing
Conference, 2008. Apscc '08. Ieee, 464-469, 2008
[229] Al-Daoud, H., Al-Azzoni, I., Down, D. “Power-Aware Linear Programming
Based Schedulingfor Heterogeneous Server Clusters”, Future Generation Computer
Systems, 28, Pp. 745–754. 2012
[230] Armbrust, M. Fox, A., Friffith, R., Joseph, A. D., Katz, R., Konwinskii, A., Lee,
G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M. “A View Of Cloud Computing”,
Communications Of The Acm, 53(4), 2010
[231] Bapna, R., Das, S., Day, R., Garfinkel, R., Stallaert, J. “A Clock-And-Offer
Auction Market For Grid Resources When Bidders Face Stochastic Computational
Needs”, Informs Journal On Computing, 23(4), Pp. 630–647.17, 2011
[232] Bartholdi, J. J., Hackman, S. T. “Warehouse And Distribution Science”,
Version 0.95, 2011
[233] Bin, E., Biran, O., Boni, O., Hadad, E., Kolodner, E. K., Moatti, Y., Lorenz, D.
H. “Guaranteeing High Availability Goals For Virtual Machine Placement”, Proc.
Icdcs Conference, Pp. 700-709, 2011
Chapter 7 Bibliography 259
[234] Chen, H., Yao, D. D. “Fundamentals Of Queueing Networks”, Springer, 2001
[235] Dai, J., Lin. W. “Maximum Pressure Policies In Stochastic Processing
Networks” Operations Research, 53(2), Pp. 197–218. 2005
[236] Dieker, A. B., Ghosh, S., Squillante, M. S. “Optimal Resource Capacity
Management For Stochastic Networks”, Preprint, 2012
[237] Dieker, A. B., Shin, J. “From Local To Global Stability In Stochastic
Processing Networks Through Quadratic Lyapunov Functions”, To Appear In
Mathematics Of Operations Research, 2012
[238] Foster, I., Zhao, Y., Raicu, I., Lu, S. “Cloud Computing And Grid Computing
360-Degree Compared”, Proc. Grid Computing Environments Workshop, Pp. 1–10,
2008
[239] Security Management In The Cloud. Available
Http://Mscerts.Net/Programming/Security%20management%20in%20the%20cloud.A
spx
[240] Gentry, C. “Computing Arbitrary Functions Of Encrypted Data”,
Communications Of The Acm, 53(3), 2010
[241] Ghosh, R., Naik V., Trivedi, K. “Power-Performance Trade-Offs In Iaas Cloud:
A Scalable Analytic Approach”, Proc. Ieee Dsn-W Conference, Pp. 152–157, 2011
[242] Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. “The Cost Of A Cloud:
Research Problems In Data Center Networks”, Acm Sigcomm Computer
Communications Review, 2009.
[243] Iyoob, I., Zarifoglu, E. “Optimal Capacity Management For Iaas Consumers”,
Working Paper, 2011
Chapter 7 Bibliography 260
[244] Iyoob, I., Zarifoglu, E., Modh, M., Farooq, M. “Optimally Sourcing Services In
Hybrid Cloud Environments”, Us Patent Filed 13/373,162, 2011
[245] Klancnik, T., Blazic, B.J. “Context-Aware Information Broker For Cloud
Computing”, International Review On Computer And Software, 5(1). 2010
[246] [I] S. Roschke, Et Ai., "Intrusion Detection In The Cloud," Presented At The
Eighth Ieee International Conference On Dependable, Autonomic And Secure
Computing, Chengdu, China, 2009.
[247] J Brodkin. Gartner Seven Cloud-Computing Security Risks, 2008
Available: Http://Www.Networkworld.Com/News/200s!07020scloud.Html
[248] D. L. Ponemon, "Security Of Cloud Computing Users," 2010.
[249] S. K. Tim Mather, And Shahed Latif, Cloud Security And Privacy: O'reilly
Media, Inc , 2009.
[250] C. Almond, "A Practical Guide To Cloud Computing Security," 27 August
2009.
[251] Http://Cloudsecurity.Trendmicro.Com/
[252] N. Mead, Et Ai, "Security Quality Requirements Engineering (Square)
Methodolgy," Carnegie Mellon Software Engineering Institute.
[253] J. W.Rittinghouse And J. F.Ransome, Cloud Computing: Taylor And Francis
Group, Llc, 2010.
[254] 22. Maguluri, S. T., Srikant, R., Ying, L. “Stochastic Models Of Load
Balancing And Scheduling In Cloud Computing Clusters”, Proc. Ieee Infocom
Conference, Pp. 702–710, 2012
Chapter 7 Bibliography 261
[255] Mateus, C. R., Gautam, N. “Efficient Control Of An M/Mt/Kt Queue With
Application To Energy Management In Data Centers”, 2011
[256]. Mell, P., Grance., T. “The Nist Definition Of Cloud Computing”, Special
Publication 800-145, National Institute Of Standards And Technology. 2011
[257] Menascé, D. A, Ngo, P. “Understanding Cloud Computing: Experimentation
And Capacity Planning”, Proc. Computer Measurement Group Conference, 2009
[258] Meng, X., Isci, C., Kephart, J., Zhang, L., Bouillet, E., Pendarakis, D. “Efficient
Resource Provisioning In Compute Clouds Via Vm Multiplexing”, Proc. Icac
Conference, Pp. 11–20, 2010.
[259] Mojcilović, A., Connors, D. “Workforce Analytics For The Services Economy”
In: Maglio, P. Et Al (Eds), Handbook Of Service Science, Springer, 2010.
[260] Security Management In The Cloud - Access Control. Available:
Http://Mscerts.Net/Programming/Security%20management%20in%20the%20cloud%
20-%20access%20control.Aspx