+ All Categories
Transcript
Page 1: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 234

CHAPTER 7

BIBLIOGRAPHY

[1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee,

D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds : A Berkeley

View of Cloud Computing, 2009.

[2] “Microsoft Windows Azure” http://www.microsoft.com/windowsazure/.

[3] “Google App Engine” http://code.google.com/appengine/.

[4] I. Foster and C. Kesselman, “The grid: blueprint for a new computing

infrastructure,” Oct. 1998.

[5] S. Clearwater, Market-Based Control: A Paradigm for Distributed Resource

Allocation, World Scientific, 1996.

[6] J. Shneidman, C. Ng, D.C. Parkes, A. AuWeng, A.C. Snoeren, A. Vahdat, and B.

Chun, “Why Markets Could (But Don’t Currently) Solve Resource Allocation

Problems in Systems,” Challenges, 2005, p. 7.

[7] P. Cramton, Y. Shoham, and R. Steinberg, Combinatorial Auctions, The MIT

Press, 2005.

[8] A. Das and D. Grosu, “Combinatorial auction-based protocols for resource

allocation in grids,” Parallel and Distributed Processing Symposium, 2005.

Proceedings. 19th IEEE International, 2005.

[9] A. Marshall, Principles of Economics (Great Minds Series), Prometheus Books,

1997.

Page 2: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 235

[10] “Market,” From Wikipedia, the free encyclopedia

http://en.wikipedia.org/wiki/Market.113

[11] D. Friedman, “The double auction market institution: A survey,” The Double

Auction Market: Institutions, Theories, And Evidence, J. Rust, ed., Westview Press,

1993, pp. 3-26.

[12] R. Buyya, D. Abramson, J. Giddy, and H. Stockinger, “Economic models for

resource management and scheduling in Grid computing,” Concurrency and

Computation: Practice and Experience, vol. 14, 2002, pp. 1507-1542.

[13] Y. Shoham and K. Leyton-Brown, Multiagent systems: Algorithmic, game-

theoretic, and logical foundations, Cambridge Univ Pr, 2009.

[14] D.S. Diamond and L.L. Selwyn, “Considerations for computer utility pricing

policies,” Proceedings of the 1968 23rd ACM national conference, New York, New

York, USA: ACM Press, 1968, pp. 189-200.

[15] I.E. Sutherland, “A futures market in computer time,” Communications of the

ACM, vol. 11, Jun. 1968, pp. 449-451.

[16] R. Buyya, D. Abramson, and S. Venugopal, “The Grid Economy,” Proceeding of

the IEEE, vol. 93, Mar. 2005, pp. 698-714.

[17] C.S. Yeo and R. Buyya, “A taxonomy of market-based resource management

systems for utility-driven cluster computing,” Software: Practice and Experience, vol.

36, Nov. 2006, pp. 1381-1419.

[18] R. Buyya and M. Murshed, “GridSim: a toolkit for the modeling and simulation

of distributed resource management and scheduling for Grid computing,”

Concurrency and Computation: Practice and Experience, vol. 14, Nov. 2002, pp.

1175-1220.

Page 3: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 236

[19] R. Buyya, R. Ranjan, and R.N. Calheiros, Modeling and simulation of scalable

Cloud computing environments and the CloudSim toolkit: Challenges and

opportunities, IEEE, 2009.

[20] C.A. Waldspurger, T. Hogg, B.A. Huberman, J.O. Kephart, and W.S. Stornetta,

“Spawn: A Distributed Computational Economy,” IEEE Transactions on Software

Engineering, vol. 18, Feb. 1992, pp. 103-117.

[21] N. Nisan, S. London, O. Regev, and N. Camiel, “Globally distributed

computation over the Internet-the POPCORN project,” Proceedings. 18th.

[22] Lewis, Grace. Cloud Computing: Finding the Silver Lining, Not the Silver

Bullet. http://www.sei.cmu.edu/newsitems/cloudcomputing.cfm, 2009.

[23] Dormann, Will & Rafail, Jason. Securing Our Web Browser.

http://www.cert.org/tech_tips/securing_browser, 2006.

[24] Jansen, Wayne & Grance, Timothy. Guidelines on Security and Privacy in Public

Cloud Computing. National Institute of Standards and Technology, 2011.

[25] Strowd, Harrison & Lewis, Grace. T-Check in System-of-Systems Technologies:

Cloud Computing (CMU/SEI-2010-TN-009). Software Engineering Institute,

Carnegie Mellon University, 2010. http: //www.sei.cmu.edu /library /abstracts /reports

/10tn009.cfm

[26] Lewis, Grace. Basics About Cloud Computing.

http://www.sei.cmu.edu/library/abstracts/whitepapers/cloudcomputingbasics.cfm

2010.

[27] Clash of the Clouds. The Economist October 15, 2009.

http://www.economist.com/displaystory.cfm?story_id=14637206 (accessed

November 15, 2009).

Page 4: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 237

[28] Proffitt, A. Pharma’s Early Cloud Adopters. BioIT World, November/December

2009, pp.31-32.

[29] Microsoft Sidekick users lose data. n

http://www.telegraph.co.uk/technology/microsoft/6316609/Microsoft-Sidekick-users-

lose-data.html (accessed November 28, 2009)

[30] Farber, R. Cloud Computing: Pie in the Sky? ScientificComputing.com,

November/December 2009

[31] H.Erdogmous, 2009. “Cloud Computing: Does nirvana hide behindthe Nebula?”

IEEE Software, vol 26.

[32] D.Boneh, 2008. “Generalization Identity based and broadcast encryption

achemes”. Vol 5350.

[33] Richard Chow, Phillepe Goel. “Controlling data in the cloud” Foster, I., Zhau,

Y., Ioan, R., & Lu, S. “Cloud Computing and Grid Computing 360-Degree

Compared.” Grid Computing Environments Workshop, 2008.2

.http://ieeexplore.ieee.org/xpls/abs_all.jsp? arnumber=4738445

[34] Grossman, R. “The Case for Cloud Computing.” ITPro 11, 2 (March/April

2009): 23-27.

[35] Amazon Elastic Compute Cloud (EC2). http://aws.amazon.com/ec2/.

[36] Amazon Virtual Private Cloud. http://aws.amazon.com/vpc/.

[37] Amazon Web Services: Overview of Security Processes, White Paper.

http://aws.amazon.com/security.

[38] Animoto - Scaling Through Viral Growth. http:

//aws.typepad.com/aws/2008/04/animoto---scali.html.

Page 5: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 238

[39] DB2 for z/OS Performance Monitoring and Tuning Guide.

http://publib.boulder.ibm.com/infocenter/dzichelp/v2r2/topic/com.ibm.db29.doc.perf/

dsnpfk17.pdf.

[40] IBM ILOG CPLEX. http://www-01.ibm.com/software/ integration/ optimization/

cplex/.

[41] IBM Service Management Tivoli Application Dependency Discovery Manager

Software. http: //www-01.ibm.com/software/tivoli/products/taddm/.

[42] Microsoft Windows Azure. http://www.microsoft.com/windowsazure/.

[43] Riverbed Technology. http://www.riverbed.com/.

[44] SQL Azure Firewall. http: //msdn.microsoft.com/en-us/library/ee621782.aspx.

[45] The Case Against Cloud Computing. http://www.cio.com/article/477473/.

[46] Websphere application server performance monitoring infrastructure (pmi).

http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.web

sphere.express.doc/info/exp/ae/cprf_pmi_arch.html.

[47] M. K. Aguilera, J. C. Mogul, J. L. Wiener, P. Reynolds, and A. Muthitacharoen.

Performance Debugging for Distributed Systems of Black Boxes. In Proc.SOSP,

2003.

[48] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G.

Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A

Berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS

Department, University of California, Berkeley, Feb 2009.

Page 6: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 239

[49] Arthur Cole. The Future Belongs to Hybrid Clouds.

http://www.itbusinessedge.com/cm/blogs/cole/the-future-belongs-to-hybrid-

louds/?cs=30482.

[50] T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to

Algorithms. McGraw-Hill Higher Education, 2001.

[51] D. Gottfrid. The New York Times Archives + Amazon Web Services =

TimesMachine. http://open.blogs.nytimes.com/2008/05/21/.

[52] J. Hamilton. The Cost of Latency. http://perspectives.mvdirona

com/2009/10/31/TheCostOfLatency.aspx, Oct. 2009.

[53] L. E. Li, M. F. Nowlan, C. Tian, Y. R. Yang, and M. Zhang. Mosaic: Policy

Homomorphic Network Extension. Technical Report YALEU/DCS/TR-1427,

CS Department, Yale University, Feb 2010.

[54] M. Tawarmalani and N. V. Sahinidis. Global optimization of mixed-integer

nonlinear programs: A theoretical and computational study. Mathematical

Programming, 99(3):563–591, 2004.

[55] K. Magoutis, M. Devarakonda, and K. Muniswamy-Reddy. Galapagos:

Automatically Discovering Application-Data Relationships in Networked Systems. In

Proc. IM, 2007.

[56] M. O’Neill. Connecting to the cloud. http:

//www.ibm.com/developerworks/library/x-cloudpt1/.

[57] K. Sripanidkulchai, S. Sahu, Y. Ruan, A. Shaikh, and C. Dorai. Are Clouds

Ready for Large Distributed Applications? In Proc. SOSP LADIS Workshop, 2009.

[58] Y.-W. E. Sung, S. G. Rao, G. G. Xie, and D. A. Maltz. Towards systematic

design of enterprise networks. In Proc. CoNEXT, 2008.

Page 7: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 240

[59] Symantec. 2010 State of the Data Center Global Data.

http://www.symantec.com/content/en/us/about/media/pdfs/Symantec_DataCenter10_

Report_Global.pdf.

[60] B. Urgaonkar, G. Pacifici, P. J. Shenoy, M. Spreitzer, and A. N. Tantawi. An

analytical model for multi-tier internet services and its applications. In Proc.

SIGMETRICS, 2005.

[61] B. Urgaonkar, P. Shenoy, A. Chandra, and P. Goyal. Dynamic Provisioning of

Multi-tier Internet Applications. In Proc. ICAC, 2005.

[62] T. Wood, P. Shenoy, A. Gerber, K. Ramakrishnan, and J. V. der Merwe. The

Case for Enterprise-Ready Virtual Private Clouds. In Proc. HotCloud Workshop,

2009.

[63] G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, G. Hjalmtysson, and J.

Rexford. On static reachability analysis of IP networks. In Proc. INFOCOM, 2005.

[64] D. Agrawal, A. El Abbadi, S. Antony, and S. Das. Data Management Challenges

in Cloud Computing Infrastructures. In DNIS, pages 1–10, 2010. 3

[65] M. Armbrust, A. Fox, D. A. Patterson, N. Lanham, B. Trushkowsky, J. Trutna,

and H. Oh. SCADS: Scale Independent Storage for Social Computing Applications.

In CIDR Perspectives, 2009. 11

[66] S. Aulbach, T. Grust, D. Jacobs, A. Kemper, and J. Rittinger. Multi-tenant

databases for software as a service: schema-mapping techniques. In SIGMOD, pages

1195–1206, 2008. 1, 2, 11

[67] F. R. Bach and M. I. Jordan. Kernel independent component analysis. J. Mach.

Learn. Res., 3:1–48, 2003. 14

Page 8: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 241

[68] M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska. Building a

database on S3. In SIGMOD, pages 251–264, 2008. 11

[69] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T.

Chandra, A. Fikes, and R. E. Gruber. Bigtable: A Distributed Storage System for

Structured Data. In OSDI, pages 205–218, 2006. 2, 3, 8, 11

[70] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A.

Warfield. Live migration of virtual machines. In NSDI, pages 273–286, 2005. 2, 4,

11, 14

[71] B. F. Cooper, R. Ramakrishnan, U. Srivastava, A. Silberstein, P. Bohannon, H.-

A. Jacobsen, N. Puz, D. Weaver, and R. Yerneni. PNUTS: Yahoo!’s hosted data

serving platform. Proc. VLDB Endow., 1(2):1277–1288, 2008. 2, 3, 11

[72] B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears.

Benchmarking Cloud Serving Systems with YCSB. In ACM SoCC, pages 143–154,

2010. 2, 9, 10

[73] C. Curino, E. Jones, Y. Zhang, E. Wu, and S. Madden. Relational Cloud: The

Case for a Database Service. Technical Report 2010-14, CSAIL, MIT, 2010. 4, 11

url: https://en.wikipedia.org/wiki/High-net-worth_individual

[74] S. Das, S. Agarwal, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic,

Scalable, and Self Managing Transactional Database for the Cloud. Technical Report

2010-04, CS, UCSB, 2010. http://www.cs.ucsb.edu/research/tech_reports/.1, 2, 7, 8,

9, 11

[75] S. Das, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic Transactional Data

Store in the Cloud. In USENIX HotCloud, 2009. 2

Page 9: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 242

[76] S. Das, D. Agrawal, and A. El Abbadi. G-Store: A Scalable Data Store for

Transactional Multi key Access in the Cloud. In ACM SoCC, pages 163–174, 2010.

3, 11

[77] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin,

S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: Amazon’s highly

available key-value store. In SOSP, pages 205–220, 2007. 1, 2, 3, 11

[78] D. J. Dewitt, S. Ghandeharizadeh, D. A. Schneider, A. Bricker, H. I. Hsiao, and

R. Rasmussen. The Gamma Database Machine Project. IEEE Trans. on Knowl. and

Data Eng., 2(1):44–62, 1990.

[79] A. Elmore, S. Das, D. Agrawal, and A. El Abbadi. Who’s Driving this Cloud?

Towards Efficient Migration for Elastic and Autonomic Multitenant Databases.

Technical Report 2010-05, CS, UCSB, 2010. http://www.cs.ucsb.edu/ research/ tech_

reports/.9, 11

[80] K. P. Eswaran, J. N. Gray, R. A. Lorie, and I. L. Traiger. The notions of

consistency and predicate locks in a database system. Commun. ACM, 19(11):624–

633, 1976. 14

[81] Facebook Statistics. http://www.facebook.com/press/info.php?statistics,

Retreived July 23, 2010. 1

[82] A. Ganapathi, H. A. Kuno, U. Dayal, J. L. Wiener, A. Fox, M. I. Jordan, and D.

A. Patterson. Predicting multiple metrics for queries: Better decisions enabled by

machine learning. In ICDE, pages 592–603, 2009. 14

[83] J. Gray. Notes on data base operating systems. In Operating Systems, An

Advanced Course, pages 393–481, London, UK, 1978. Springer-Verlag. 5, 6

[84] J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques.

Morgan Kaufmann Publishers Inc., 1992. 4

Page 10: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 243

[85] P. Helland. Life beyond Distributed Transactions: An Apostate’s Opinion. In

CIDR, pages 132–141, 2007. 3

[86] P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. ZooKeeper: Wait-free

Coordination for Internet-scale Systems. In USENIX Annual Technical Conference,

2010. 8, 9

[87] D. Jacobs and S. Aulbach. Ruminations on multi-tenant databases. In BTW,

pages 514–521, 2007. 1, 2, 3, 11

[88] T. Kraska, M. Hentschel, G. Alonso, and D. Kossmann. Consistency Rationing in

the Cloud: Pay only when it matters. PVLDB, 2(1):253–264, 2009. 11, 12

[89] H. T. Kung and J. T. Robinson. On optimistic methods for concurrency control.

ACM Trans. Database Syst., 6(2):213–226, 1981. 4, 8, 14

[90] H. Liu, H. Jin, X. Liao, L. Hu, and C. Yu. Live migration of virtual machine

based on full system trace and replay. In HPDC, pages 101–110, 2009. 11

[91] D. B. Lomet, A. Fekete, G. Weikum, and M. J. Zwilling. Unbundling transaction

services in the cloud. In CIDR Perspectives, 2009. 3, 11

[92] J. B. Rothnie Jr., P. A. Bernstein, S. Fox, N. Goodman, M. Hammer, T. A.

Landers, C. L. Reeve, D. W. Shipman, and E. Wong. Introduction to a System for

Distributed Databases url: http://www.codeproject.com/Articles/49662/cloud-

computing-SaaS (SDD-1). ACM Trans. Database Syst., 5(1):1–17, 1980. 11

[93] G. H. Sockut and B. R. Iyer. Online reorganization of databases. ACM Comput.

Surv., 41(3):1–136, 2009. 11

[94] A. A. Soror, U. F. Minhas, A. Aboulnaga, K. Salem, P. Kokosielis, and S.

Kamath. Automatic virtual machine configuration for database workloads. In

SIGMOD, pages 953–966, 2008. 1, 2, 11

Page 11: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 244

[95] The Transaction Processing Performance Council. TPC-C benchmark (Version

5.10.1), 2009. 2, 9, 10

[96] C. D. Weissman and S. Bobrowski. The design of the force.com multitenant

internet application development platform. In SIGMOD, pages 889–896, 2009. 1, 2,

11

[97] F. Yang, J. Shanmugasundaram, and R. Yerneni. A scalable data platform for a

large number of small applications. In CIDR, 2009

[98] J. Baker, C. Bond, J. Corbett, J. Furman, A. Khorlin, J. Larson, J.-M. Leon, Y.

Li, A. Lloyd, and V. Yushprakh. Megastore: Providing Scalable, Highly Available

Storage for Interactive Services. In CIDR, pages 223–234, 2011.

[99] H. Berenson, P. Bernstein, J. Gray, J. Melton, E. O’Neil, and P. O’Neil. A

critique of ANSI SQL isolation levels. In SIGMOD, pages 1–10, 1995.

[100] P. A. Bernstein, I. Cseri, N. Dani, N. Ellis, A. Kalhan, G. Kakivaya, D. B.

Lomet, R. Manner, L. Novik, and T. Talius. Adapting Microsoft SQL Server for

Cloud Computing. In ICDE, 2011.

[101] P. A. Bernstein and E. Newcomer. Principles of Transaction Processing.

Morgan Kaufmann Publishers Inc., second edition, 2009.

[102] R. Bradford, E. Kotsovinos, A. Feldmann, and H. Schiöberg. Live wide-area

migration of virtual machines including local persistent state. In VEE, pages 169–179,

2007.

[103] M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska. Building a

database on S3. In SIGMOD, pages 251–264, 2008.

Page 12: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 245

[104] S. Chandrasekaran and R. Bamford. Shared cache – the future of parallel

databases. In ICDE, pages 840–850, 2003.

[105] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A.

Warfield. Live migration of virtual machines. In NSDI, pages 273–286, 2005.

[106] B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears.

Benchmarking Cloud Serving Systems with YCSB. In ACM SoCC, pages 143–154,

2010.

[107] C. Curino, E. Jones, R. Popa, N. Malviya, E. Wu, S. Madden, H. Balakrishnan,

and N. Zeldovich. Relational Cloud: A Database Service for the Cloud. In CIDR,

pages 235–240, 2011.

[108] S. Das, S. Agarwal, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic,

Scalable, and Self Managing Transactional Database for the Cloud. Technical Report

2010-04, CS, UCSB, 2010.

[109] S. Das, D. Agrawal, and A. El Abbadi. ElasTraS: An Elastic Transactional Data

Store in the Cloud. In USENIX HotCloud, 2009.

[110] S. Das, S. Nishimura, D. Agrawal, and A. El Abbadi. Live Database Migration

for Elasticity in a Multitenant Database for Cloud Platforms. Technical Report 2010-

09, CS, UCSB, 2010.

[111] K. P. Eswaran, J. N. Gray, R. A. Lorie, and I. L. Traiger. The notions of

consistency and predicate locks in a database system. Commun. ACM, 19(11):624–

633, 1976.

[112] Facebook Statistics. http://www.facebook.com/press/info.php?statistics,

Retreived March 18, 2010.

Page 13: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 246

[113] J. Gray. Notes on data base operating systems. In Operating Systems, An

Advanced Course, pages 393–481, London, UK, 1978. Springer-Verlag.

[114] J. N. Gray, R. A. Lorie, and G. R. Putzolu. Granularity of locks in a shared data

base. In VLDB, pages 428–451, 1975.

[115] H2 Database Engine. http://www.h2database.com/html/main.html, 2011.

[116] D. Jacobs and S. Aulbach. Ruminations on multi-tenant databases. In BTW,

pages 514–521, 2007.

[117] H. Liu, H. Jin, X. Liao, L. Hu, and C. Yu. Live migration of virtual machine

based on full system trace and replay. In HPDC, pages 101–110, 2009.

[118] D. B. Lomet. Replicated indexes for distributed data. In PDIS, pages 108–119.

IEEE Computer Society, 1996.

[119] D. B. Lomet, A. Fekete, G. Weikum, and M. J. Zwilling. Unbundling

transaction services in the cloud. In CIDR, 2009.

[120] C. Mohan, D. Haderle, B. Lindsay, H. Pirahesh, and P. Schwarz. Aries: a

transaction recovery method supporting fine-granularity locking and partial rollbacks

using write-ahead logging. ACM TODS, 17(1):94–162, 1992.

[121] A. A. Soror, U. F. Minhas, A. Aboulnaga, K. Salem, P. Kokosielis, and S.

Kamath. Automatic virtual machine configuration for database workloads. In

SIGMOD, pages 953–966, 2008.

[122] C. D. Weissman and S. Bobrowski. The design of the force.com multitenant

internet application development platform. In SIGMOD, pages 889–896, 2009.

[123] F. Yang, J. Shanmugasundaram, and R. Yerneni. A scalable data platform for a

large number of small applications. In CIDR 2009

Page 14: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 247

[124] McKinsey & Co. Report presented at Uptime Institute Symposium April 18,

2009. Clearing the Air on Cloud Computing. http://uptimeinstitute.org/

content/view/353/319;http://images.cxotoday.com/cxoimages/storyimagesmatter1011

57 .pdf (accessed November 27, 2009).

[125] Traian Andrei & Prof. Raj Jain, Cloud Computing Challenges and Related

Security Issues, url: http://www.cse.wustl.edu/~jain/cse571-09/index.html April 30,

2009

[126] Alistair Croll, "Why Cloud Computing Needs Security", 2008 url:

http://gigaom.com/2008/06/10/the-amazon-outage-fortresses-in-the-clouds/

[127 Jonothan Erickson, "Best Practices for Protecting Data in the Cloud", 2008

http://www.ddj.com/security/210602698

[128] Jon Brodkin, "Seven Cloud-Computing Security Risks", 2008

http://www.networkworld.com/news/2008/070208-cloud.html

[129] Elinor Mills, "Cloud Computing Security Forecast: Clear Skies", 2009

http://news.zdnet.com/2100-9595_22-264312.html

[130] Geva Perry, "How Cloud & Utility Computing Are Different", 2008

http://gigaom.com/2008/02/28/how-cloud-utility-computing-are-different/

[131] Neil Wienberg, "Cloudy picture for cloud computing", 2008

http://www.networkworld.com/news/2008/043008-interop-cloudcomputing.html

[132] Ephraim Schwartz, "Hybrid model brings security to the cloud", 2008

http://www.infoworld.com/d/cloud-computing/hybrid-model-brings-security-cloud-

364

[133] The Open Cloud Consortium, 2008

Page 15: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 248

http://www.opencloudconsortium.org/index.html

[134] Open Security Architecture, 2009 http://www.opensecurityarchitecture.org/cms/

[135] Paul Jaeger, Jimmy Lin, Justin Grimes, "Cloud Computing and Information

Policy", March 2008

[136] Shivlal Mewada, Umesh kumar Singh and Pradeep Sharma, Security Based

Model for Cloud Computing IRACST – International Journal of Computer Networks

and Wireless Communications (IJCNWC), Vol. 1, No. 1, December 2011

[137] Ricardo vilaca, Rui oliveira 2009. Clouder: A Flexible Large Scale

Decentralized Object Store. Architecture Overview. Proceeding of WDDDM ’09

[138] Michael Miller. Cloud Computing-Web Based Application that change the way

you collaborate online. Publishing of QUE, 2nd print. 2009

[139] National Institute Of Standard and technology.csrc.nist.gov/groups/ SNS/cloud-

computing/cloud-def-v15.doc, 2009

[140] Open Security Architecture http://www.opensecurityarchitecture.org/

[141] Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy :

An Enterprise perspective of Risks

[142] GregBoss, Padma Malladi, Dennis Quan, Linda Legregni and Harold hall

Cloud Computing. Available from www.ibm.com/developerworks/ websphere/ zones

/hipods/, 2007.

[143] Anthony T.Velte, Toby J.Velte and Robert Elsenpeter. Cloud Computing- A

Practical Approach. Publishing of Tata McGRAW Hill, 2010

Page 16: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 249

[144] Saurabh Kumar. Security Issues In Cloud Computing. Available

fromserl.iiit.ac.in/cs6600/saurabh.ppt.

[145] Krešimir Popović, Željko Hocenski,” Cloud computing security issues and

challenges”, MIPRO 2010, May 24-28, 2010

[146] Gartner: Seven cloud-computing security risks, 02 July 2008,

http://www.infoworld.com/d/security-central/gartnersevencloud-computing-security-

risks-853

[147] Wikipedia, 6 February 2010, http://en.wikipedia.org/wiki/Risk_management

[148] Wikipedia, 27 January 2010, http://en.wikipedia.org/wiki/Risk_assessment

[149] D. Catteddu, Giles Hogben: European Network and Information Security

Agency, November 2009.

http://www.enisa.europa.eu/act/rm/ files/deliverables/ cloud computing-risk-

assessment

[150] P Mell, K Scarfone, S Romanosky - Published by FIRST-Forum of Incident,

June 2007.

[151] Mike Schiffman, Gerhard Eschelbeck, David Ahmad, Andrew Wright, Sasha

Romanosky, "CVSS: A Common Vulnerability Scoring System", National

Infrastructure Advisory Council (NIAC), 2004.

[152] Microsoft Corporation. Microsoft Security Response Center Security Bulletin

Severity Rating System. November 2002.

http://www.microsoft.com/technet/security/bulletin/rating.mspx.

[153] United States Computer Emergency Readiness Team (US-CERT). US-CERT

Vulnerability Note Field Descriptions. 2006.

http://www.kb.cert.org/vuls/html/fieldhelp.

Page 17: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 250

[154] SANS Institute. SANS Critical Vulnerability Analysis Archive. Undated,2007.

http://www.sans.org/newsletters/cva/.

[155] Arnold, John. “Domain 10: Guidance for Application Security V2.1.” Cloud

Security Alliance, July 2010

http://www.cloudsecurityalliance.org/guidance/csaguidedom10-v2.10.pdf,

[156] Badger, Lee, and Tim Grance. “Standards Acceleration to Jumpstart Adoption

of Cloud Computing.” NIST Computer Security Division Briefing, May 20, 2010 at:

http://www.slideshare.net/kvjacksn/nist-cloud-computingforumbadgergrance.

[157] Baldor, Lolita C. “Pentagon spends $100M to fix Cyber Attacks.” Physorg.com,

April 7,2009

http://www.physorg.com/news158333019.html.

[158] Beckman, Mel. “Cloud Options that IT will Love.” An Interactive eBook:

Cloud Computing, July 15, 2010

http://www.networkworld.com/whitepapers/nww/pdf/eGuide_cloud_5brand_final.pdf

.

[159]Biscotti, Fabrizio, Benoit J. Lheureux, Andrew Frank, Jeffrey Roster, Susan

Cournoyer, and Venecia K. Liu. “Forecast: Public Cloud Services, Worldwide and

Regions, Industry Sectors, 2009-2014.” Gartner, Inc., June 2, 2010,

http://www. gartner.com/DisplayDocument?ref=clientFriendlyUrl&id=1378513

[160] Bolin, Jason S. Use Case Analysis for Adopting Cloud Computing in Army

Test and Evaluation. Naval Postgraduate School Master’s Thesis, September 2010

http://edocs.nps.edu/npspubs/scholarly/theses/2010/Sep/10Sep_Bolin.pdf

[161] Brodkin, Jon. “Gartner: Seven cloud computing security risks.” Infoworld, July

2, 2008

http://www.infoworld.com/d/security-central/gartner-seven-cloud-computingsecurity-

risks-853.

Page 18: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 251

[162] Brunette, Glenn and Rich Mogull, “Security Guidance for Critical Areas of

Focus in Cloud Computing, V2.1.” Cloud Security Alliance, December 2009,

at: http://www.cloudsecurityalliance.org/csaguide.pdf.

[163] Carey, Allan. “Cloud Assurance Still Missing,” Information Assurance

Newsletter, Vol. 13, No. 1, 2010.

[164] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G.

Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds: A

Berkeley View of Cloud Computing, 2009.

[165] “Microsoft Windows Azure” http://www.microsoft.com/windowsazure/.

[166] “Google App Engine” http://code.google.com/appengine/.

[167] I. Foster and C. Kesselman, “The grid: blueprint for a new computing

infrastructure,” Oct. 1998.

[168] S. Clearwater, Market-Based Control: A Paradigm for Distributed Resource

Allocation, World Scientific, 1996.

[169] J. Shneidman, C. Ng, D.C. Parkes, A. AuYoung, A.C. Snoeren, A. Vahdat, and

B. Chun, “Why Markets Could (But Don’t Currently) Solve Resource Allocation

Problems in Systems,” Challenges, 2005

[170] P. Cramton, Y. Shoham, and R. Steinberg, Combinatorial Auctions, The MIT

Press, 2005.

[171] A. Das and D. Grosu, “Combinatorial auction-based protocols for resource

allocation in grids,” Parallel and Distributed Processing Symposium, 2005.

Proceedings. 19th

IEEE International, 2005.

Page 19: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 252

[172] A. Marshall, Principles of Economics (Great Minds Series), Prometheus Books,

1997.

[173] “Market,” From Wikipedia, the free encyclopedia

http://en.wikipedia.org/wiki/Market.

[174] D. Friedman, “The double auction market institution: A survey,” The Double

Auction Market: Institutions, Theories, And Evidence, J. Rust, ed., Westview Press,

pp. 3-26, 1993

[175] R. Buyya,D. Abramson, J. Giddy, and H. Stockinger, “Economic models for

resource management and scheduling in Grid computing,” Concurrency and

Computation: Practice and Experience, pp. 1507-1542, vol. 14, 2002.

[176] Y. Shoham and K. Leyton-Brown, Multiagent systems: Algorithmic,

game-theoretic, and logical foundations, Cambridge Univ Pr, 2009.

[177] D.S. Diamond and L.L. Selwyn, “Considerations for computer utility pricing

policies,” Proceedings of the 1968 23rd ACM national conference, New York,

New York, USA: ACM Press, pp. 189-200, 1968

[178] I.E. Sutherland, “A futures market in computer time,” Communications of the

ACM, vol. 11, pp. 449-451, Jun. 1968

[179] R. Buyya, D. Abramson, and S. Venugopal, “The Grid Economy,” Proceedings

of the IEEE, vol. 93, pp. 698-714, Mar. 2005

[180] C.S. Yeo and R. Buyya, “A taxonomy of market-based resource management

systems for utility-driven cluster computing,” Software: Practice and Experience, vol.

36, pp. 1381-1419, Nov. 2006

[181] R. Buyya and M. Murshed, “GridSim: a toolkit for the modeling and simulation

of distributed resource management and scheduling for Grid computing,”

Page 20: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 253

Concurrency and Computation: Practice and Experience, vol. 14, pp. 1175-1220, Nov.

2002

[182] R. Buyya, R. Ranjan, and R.N. Calheiros, Modeling and simulation of scalable

Cloud computing environments and the CloudSim toolkit: Challenges and

opportunities, IEEE, 2009.

[183] C.A. Waldspurger, T. Hogg, B.A. Huberman, J.O. Kephart, and W.S. Stornetta,

“Spawn: A Distributed Computational Economy,” IEEE Transactions on Software

Engineering, pp. 103-117, vol. 18, Feb. 1992

[184] U.S. Interagency OPSEC Support Staff, OPSEC Glossary of Terms available

from http://www.ioss.gov/docs/definitions.html; Internet, accessed 18 October 2005

[183] Sun Microsystems, Introduction to Cloud Computing Architecture, 2009

[184] Fellows, W. Partly Cloudy, Blue-Sky Thinking About Cloud Computing. 451

Group, 2008

[185] Varia, J. Cloud Architectures. Amazon Web Services, 2009.

[186] Chappell, D. Introducing the Azure Services Platform. David Chappell &

Associates, 2009

[187] Rayport, J. F. And Heyward, A. Envisioning the Cloud: The Next Computing

Paradigm. Market space, 2009.

[188] Pastaki Rad, M., Sajedi Badashian, A., Meydanipour, G., Ashurzad Delcheh,

M., Alipour, M. And Afzali, H. A Survey Of Cloud Platforms and Their Future, 2009.

[189] Khajeh-Hosseini, A., Sommerville, I. And Sriram, I. "Research Challenges for

Enterprise Cloud Computing," (unpublished).( Submitted to 1st ACM

Page 21: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 254

Symposium on Cloud Computing, Indianapolis, Indiana, USA, under paper id 54,

June 2010

[190] IBM, Staying aloft in tough times, 2009

[191] Plummer, D.C., Bittman , T.J., Austin, T., Cearley, D.W., And Smith D.M.,

Cloud Computing: Defining And Describing An Emerging Phenomenon , 2008

[192] Staten, J., Is Cloud Computing Ready For The Enterprise?, 2008.

[193] Mell, P. And Grance, T. 2009. Draft Nist Working Definition Of Cloud

Computing.

[194] Erdogmus, H. Cloud Computing: Does Nirvana Hide Behind The Nebula?

Software, IEEE 26, 2, 4-6, 2009

[195] Lemos, R. 2009. Inside One Firm's Private Cloud Journey. Retrieved December

1, 2009, from http://www.cio.com/article/506114/Inside_One_Firm_s_Pri

vate_Cloud_Journey

[196] Open CirrusTM: the HP/Intel/Yahoo! Open Cloud Computing Research

Testbed. Retrieved December 1, 2009, from https://opencirrus.org/

[197] Vaquero, L., Merino, L., Caceres, J. And Lindner, M. A break in the clouds:

towards a cloud definition. SIGCOMM Comput. Commun. Rev. 39, 1, 50-55, 2009.

[198] Youseff, L., Butrico, M. And Da Silva, D. 2008. Toward a Unified Ontology of

Cloud Computing. In Grid Computing Environments Workshop, GCE '08, 1-10,

2008.

[199] J. Appavoo, V. Uhlig, and A. Waterland, "Project Kittyhawk: Building a

Global-Scale Computer," vol. 42, pp. pp. 77-84, , 2008

Page 22: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 255

[200] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D.

Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds: A Berkeley View

of Cloud Computing, 2009.

[201] Weinman, J. 10 Reasons Why Telcos Will Dominate Enterprise Cloud

Computing, 2008

[202] Voas, J. And Zhang, J. Cloud Computing: New Wine Or Just A New Bottle? IT

Professional 11, 2, 15-17, 2009.

[203]Vouk, M. A. 2008. Cloud computing — Issues, research and

implementations. In Information Technology Interfaces, ITI 2008. 30th International

Conference on, 31-40, 2008.

[204] Foster, I., Zhao, Y., Raicu, I. And Lu, S. 2008. Cloud Computing and Grid

Computing 360-Degree Compared. In Grid Computing Environments Workshop

(GCE '08), Austin, Texas, USA, November 2008.

[205] Corbató, F. J., Saltzer, J. H., and Clingen, C. T. 1972. Multics: the first seven

years. In Proceedings of the May 16-18, 1972, Spring Joint Computer Conference,

Atlantic City, New Jersey, 571-583, May 1972

[206] Buyya, R., Yeo, C. And Venugopal, S. 2008. Market-Oriented Cloud

Computing: Vision, Hype, and Reality for Delivering IT Services as Computing

Utilities. In High Performance Computing and Communications. HPCC '08. 10th

IEEE International Conference on, 5-13, 2008

[207] Chang, M., He, J., And E. Leon, "Service-Orientation in the Computing

Infrastructure," pp. 27-33, 2006.

[208] Sedayao, J. Implementing And operating an internet scale distributed

application using service oriented architecture principles and cloud computing

Page 23: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 256

infrastructure. In iiWAS '08: Proceedings of the 10th International Conference on

Information Integration and Web-based Applications & Services, 417-421, 2008

[209] Zhang, L. And Zhou, Q. Ccoa: Cloud Computing Open Architecture. In Web

Services, 2009. ICWS 2009. IEEE International Conference on, 607-616, 2009

[210] Napper, J. And Bientinesi, P. Can cloud computing reach the top500? In

UCHPC-MAW '09: Proceedings of the combined workshops on UnConventional high

performance computing workshop plus memory access workshop, 17-20, 2009

[211] Birman, K., Chockler, G., and van Renesse, R. Toward a cloud computing

research agenda. SIGACT News, 40, 2, 68-80, 2009

[212] Keahey, K., Tsugawa, M., Matsunaga, A. And Fortes, J. Sky Computing.

Internet Computing, IEEE 13, 5, 43-51, 2009

[213] Ohlman, B., Eriksson, A. And Rembarz, R. 2009. What Networking of

Information Can Do for Cloud Computing. In Enabling Technologies: Infrastructures

for Collaborative Enterprises. WETICE '09. 18th IEEE International Workshops on,

78-83, 2009

[214] Matthews, J., Garfinkel, T., Hoff, C. And Wheeler, J.. Virtual machine contracts

for datacenter and cloud computing environments. In ACDC'09: Proceedings of the

1st workshop on Automated control for datacenters and clouds, 25-30, 2009

[215] Lim, H., Babu, S., Chase, J. And Parekh, S. Automated Control In Cloud

computing: challenges and opportunities. In ACDC '09: Proceedings of the 1st

workshop on Automated control for datacenters and clouds, 13-18., 2009

[216] Mikkilineni, R. And Sarathy, V. Cloud Computing and the Lessons from the

Past. In Enabling Technologies: Infrastructures for Collaborative Enterprises.

WETICE '09. 18th IEEE International Workshops on, 57-62, 2009

Page 24: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 257

[217] Grossman, R. L. The Case For Cloud Computing. It Professional 11, 2, 23-27.

2009

[218] Sotomayor, B., Rubã©, A., Llorente, I. And Foster, I.. Virtual Infrastructure

Management In Private And Hybrid Clouds. Internet Computing, Ieee 13, 5, 14-22,

2009

[219] Song, S., Ryu, K. And Da Silva, D. 2009. Blue Eyes: Scalable And Reliable

System Management For Cloud Computing. In Parallel & Distributed Processing,

Ipdps 2009. Ieee International Symposium On, 1-8, 2009.

[220] Vishwanath, K., Greenberg, A. And Reed, D. Modular Data Centers: How To

Design Them? 2009

[221] Sriram, I. 2009. A Simulation Tool Exploring Cloudscale Data Centres. In 1st

International Conference On Cloud Computing, Pp. 381-392, 2009

[222] Buyya, R., Ranjan, R. And Calheiros, R. N. 2009. Modeling And Simulation Of

Scalable Cloud Computing Environments And The Cloudsim Toolkit: Challenges

And Opportunities. In High Performance Computing & Simulation. Hpcs '09.

International Conference On, 1-11, 2009

[223] H. Abdelsalam, K. Maly, R. Mukkamala, M. Zubair, And D. Kaminsky,

"Towards Energy Efficient Change Management In A Cloud Computing

Environment," Pp. 161-166, 2009

[224] Chun, B.-G. And Maniatis, P. Augmented Smart Phone Applications Through

Clone Cloud Execution. In Proceedings Of The 12th Workshop On Hot Topics In

Operating Systems (Hotos Xii), 2009

[225] Ganon, Z. And Zilbershtein, I. E. Cloud-Based Performance Testing Of

Network Management Systems. In Computer Aided Modeling And Design Of

Page 25: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 258

Communication Links And Networks, Camad '09. Ieee 14th International Workshop

On, 1-6, 2009.

[226] Mathew, R. And Spraetz, R. Test Automation On A Saas Platform. In Software

Testing Verification And Validation, 2009. Icst '09. International Conference On,

317-325. 2009

[227] Wilson, M. Constructing And Managing Appliances For Cloud Deployments

From Repositories Of Reusable Components. 2009

[228] Mei, L., Chan, W. K. And Tse, T. H. A Tale Of Clouds: Paradigm Comparisons

And Some Thoughts On Research Issues. In Asia-Pacific Services Computing

Conference, 2008. Apscc '08. Ieee, 464-469, 2008

[229] Al-Daoud, H., Al-Azzoni, I., Down, D. “Power-Aware Linear Programming

Based Schedulingfor Heterogeneous Server Clusters”, Future Generation Computer

Systems, 28, Pp. 745–754. 2012

[230] Armbrust, M. Fox, A., Friffith, R., Joseph, A. D., Katz, R., Konwinskii, A., Lee,

G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M. “A View Of Cloud Computing”,

Communications Of The Acm, 53(4), 2010

[231] Bapna, R., Das, S., Day, R., Garfinkel, R., Stallaert, J. “A Clock-And-Offer

Auction Market For Grid Resources When Bidders Face Stochastic Computational

Needs”, Informs Journal On Computing, 23(4), Pp. 630–647.17, 2011

[232] Bartholdi, J. J., Hackman, S. T. “Warehouse And Distribution Science”,

Version 0.95, 2011

[233] Bin, E., Biran, O., Boni, O., Hadad, E., Kolodner, E. K., Moatti, Y., Lorenz, D.

H. “Guaranteeing High Availability Goals For Virtual Machine Placement”, Proc.

Icdcs Conference, Pp. 700-709, 2011

Page 26: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 259

[234] Chen, H., Yao, D. D. “Fundamentals Of Queueing Networks”, Springer, 2001

[235] Dai, J., Lin. W. “Maximum Pressure Policies In Stochastic Processing

Networks” Operations Research, 53(2), Pp. 197–218. 2005

[236] Dieker, A. B., Ghosh, S., Squillante, M. S. “Optimal Resource Capacity

Management For Stochastic Networks”, Preprint, 2012

[237] Dieker, A. B., Shin, J. “From Local To Global Stability In Stochastic

Processing Networks Through Quadratic Lyapunov Functions”, To Appear In

Mathematics Of Operations Research, 2012

[238] Foster, I., Zhao, Y., Raicu, I., Lu, S. “Cloud Computing And Grid Computing

360-Degree Compared”, Proc. Grid Computing Environments Workshop, Pp. 1–10,

2008

[239] Security Management In The Cloud. Available

Http://Mscerts.Net/Programming/Security%20management%20in%20the%20cloud.A

spx

[240] Gentry, C. “Computing Arbitrary Functions Of Encrypted Data”,

Communications Of The Acm, 53(3), 2010

[241] Ghosh, R., Naik V., Trivedi, K. “Power-Performance Trade-Offs In Iaas Cloud:

A Scalable Analytic Approach”, Proc. Ieee Dsn-W Conference, Pp. 152–157, 2011

[242] Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. “The Cost Of A Cloud:

Research Problems In Data Center Networks”, Acm Sigcomm Computer

Communications Review, 2009.

[243] Iyoob, I., Zarifoglu, E. “Optimal Capacity Management For Iaas Consumers”,

Working Paper, 2011

Page 27: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 260

[244] Iyoob, I., Zarifoglu, E., Modh, M., Farooq, M. “Optimally Sourcing Services In

Hybrid Cloud Environments”, Us Patent Filed 13/373,162, 2011

[245] Klancnik, T., Blazic, B.J. “Context-Aware Information Broker For Cloud

Computing”, International Review On Computer And Software, 5(1). 2010

[246] [I] S. Roschke, Et Ai., "Intrusion Detection In The Cloud," Presented At The

Eighth Ieee International Conference On Dependable, Autonomic And Secure

Computing, Chengdu, China, 2009.

[247] J Brodkin. Gartner Seven Cloud-Computing Security Risks, 2008

Available: Http://Www.Networkworld.Com/News/200s!07020scloud.Html

[248] D. L. Ponemon, "Security Of Cloud Computing Users," 2010.

[249] S. K. Tim Mather, And Shahed Latif, Cloud Security And Privacy: O'reilly

Media, Inc , 2009.

[250] C. Almond, "A Practical Guide To Cloud Computing Security," 27 August

2009.

[251] Http://Cloudsecurity.Trendmicro.Com/

[252] N. Mead, Et Ai, "Security Quality Requirements Engineering (Square)

Methodolgy," Carnegie Mellon Software Engineering Institute.

[253] J. W.Rittinghouse And J. F.Ransome, Cloud Computing: Taylor And Francis

Group, Llc, 2010.

[254] 22. Maguluri, S. T., Srikant, R., Ying, L. “Stochastic Models Of Load

Balancing And Scheduling In Cloud Computing Clusters”, Proc. Ieee Infocom

Conference, Pp. 702–710, 2012

Page 28: CHAPTER 7 BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/25026/4/bibliography.pdf · Chapter 7 Bibliography 237 [28] Proffitt, A. Pharma’s Early Cloud Adopters.

Chapter 7 Bibliography 261

[255] Mateus, C. R., Gautam, N. “Efficient Control Of An M/Mt/Kt Queue With

Application To Energy Management In Data Centers”, 2011

[256]. Mell, P., Grance., T. “The Nist Definition Of Cloud Computing”, Special

Publication 800-145, National Institute Of Standards And Technology. 2011

[257] Menascé, D. A, Ngo, P. “Understanding Cloud Computing: Experimentation

And Capacity Planning”, Proc. Computer Measurement Group Conference, 2009

[258] Meng, X., Isci, C., Kephart, J., Zhang, L., Bouillet, E., Pendarakis, D. “Efficient

Resource Provisioning In Compute Clouds Via Vm Multiplexing”, Proc. Icac

Conference, Pp. 11–20, 2010.

[259] Mojcilović, A., Connors, D. “Workforce Analytics For The Services Economy”

In: Maglio, P. Et Al (Eds), Handbook Of Service Science, Springer, 2010.

[260] Security Management In The Cloud - Access Control. Available:

Http://Mscerts.Net/Programming/Security%20management%20in%20the%20cloud%

20-%20access%20control.Aspx


Top Related