Sciweavers

163 search results - page 6 / 33
» Securing elasticity in the cloud
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
The Impact of Virtualization on Network Performance of Amazon EC2 Data Center
Abstract--Cloud computing services allow users to lease computing resources from large scale data centers operated by service providers. Using cloud services, users can deploy a wi...
Guohui Wang, T. S. Eugene Ng

Publication
293views
14 years 3 months ago
Providing a Cloud Network Infrastructure on a Supercomputer
Supercomputers and clouds both strive to make a large number of computing cores available for computation. More recently, similar objectives such as low-power, manageability at sc...
J. Appavoo, V. Uhlig, A. Waterland, B. Rosenburg, ...
CCS
2010
ACM
14 years 3 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
ACISP
2008
Springer
14 years 3 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
MOBILWARE
2010
ACM
13 years 6 months ago
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms
We propose a new elastic application model that enables the seamless and transparent use of cloud resources to augment the capability of resourceconstrained mobile devices. The sal...
Xinwen Zhang, Sangoh Jeong, Anugeetha Kunjithapath...