Description |
1 online resource |
|
text file |
Bibliography |
Includes bibliographical references and index. |
Summary |
Explores themes that drive individual contributions, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance - Synthesizes highly cited earlier work (on topics including DARE, trust mechanisms, and elastic graphs) as well as newer research findings on topics including R-Storm, and RAMP transactions - Addresses assured cloud computing concerns such as game theory, stream processing, storage, algorithms, workflow, scheduling, access control, formal analysis of safety, and streaming Marketing Description: IEEE Computer Society, the IEEE Reliability Society, and the IEEE Systems, Man, and Cybernetics Society-- Provided by publisher. |
Contents |
Assured Cloud Computing; Table of Contents; Preface; Editors' Biographies; List of Contributors; Chapter 1: Introduction; 1.1 Introduction; 1.1.1 Mission-Critical Cloud Solutions for the Military; 1.2 Overview of the Book; References; Chapter 2: Survivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using Maude; 2.1 Introduction; 2.1.1 State of the Art; 2.1.2 Vision: Formal Methods for Cloud Storage Systems; 2.1.3 The Rewriting Logic Framework; 2.1.4 Summary: Using Formal Methods on Cloud Storage Systems; 2.2 Apache Cassandra. |
|
Chapter 3: Risks and Benefits: Game-Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud3.1 Introduction; 3.2 Vision: Using Cloud Technology in Missions; 3.3 State of the Art; 3.4 System Model; 3.5 Game Model; 3.6 Game Analysis; 3.7 Model Extension and Discussion; 3.8 Numerical Results and Analysis; 3.8.1 Changes in User 2's Payoff with Respect to L2; 3.8.2 Changes in User 2's Payoff with Respect to e; 3.8.3 Changes in User 2's Payoff with Respect to π; 3.8.4 Changes in User 2's Payoff with Respect to qI; 3.8.5 Model Extension to = 10 Users; 3.9 The Future. |
|
2.3 Formalizing, Analyzing, and Extending Google's Megastore2.3.1 Specifying Megastore; 2.3.2 Analyzing Megastore; 2.3.2.1 Megastore-CGC; 2.4 RAMP Transaction Systems; 2.5 Group Key Management via ZooKeeper; 2.5.1 Zookeeper Background; 2.5.2 System Design; 2.5.3 Maude Model; 2.5.4 Analysis and Discussion; 2.6 How Amazon Web Services Uses Formal Methods; 2.6.1 Use of Formal Methods; 2.6.2 Outcomes and Experiences; 2.6.3 Limitations; 2.7 Related Work; 2.8 Concluding Remarks; 2.8.1 The Future; Acknowledgments; References. |
|
4.5.1 Hypervisor Introspection4.5.1.1 VMI Monitor; 4.5.1.2 VM Suspend Side-Channel; 4.5.1.3 Limitations of Hypervisor Introspection; 4.5.2 Evading VMI with Hypervisor Introspection; 4.5.2.1 Insider Attack Model and Assumptions; 4.5.2.2 Large File Transfer; 4.5.3 Defenses against Hypervisor Introspection; 4.5.3.1 Introducing Noise to VM Clocks; 4.5.3.2 Scheduler-Based Defenses; 4.5.3.3 Randomized Monitoring Interval; 4.5.4 Summary; 4.6 Identifying Compromised Users in Shared Computing Infrastructures; 4.6.1 Target System and Security Data; 4.6.1.1 Data and Alerts. |
Subject |
Cloud computing.
|
|
Infonuagique. |
|
Cloud computing |
Added Author |
Campbell, Roy Harold, editor.
|
|
Kamhoua, Charles A., editor.
|
|
Kwiat, Kevin A., editor.
|
Other Form: |
Print version: Assured cloud computing. First edition. Hoboken, NJ : IEEE Computer Society, Inc./Wiley, 2018 1119428637 9781119428633 (OCoLC)1005118106 |
ISBN |
9781119428480 (electronic bk.) |
|
1119428483 (electronic bk.) |
|
1119428505 |
|
9781119428503 |
|
9781119428497 (electronic) |
|
1119428491 |
Standard No. |
9781119428633 |
|
10.1002/9781119428497 doi |
|