Sciweavers

6195 search results - page 119 / 1239
» Cloud Computing Security
Sort
View
PDCAT
2007
Springer
15 years 10 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
ACSAC
1999
IEEE
15 years 8 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
HPDC
2010
IEEE
15 years 5 months ago
Exploring application and infrastructure adaptation on hybrid grid-cloud infrastructure
Clouds are emerging as an important class of distributed computational resources and are quickly becoming an integral part of production computational infrastructures. An importan...
Hyunjoo Kim, Yaakoub El Khamra, Shantenu Jha, Mani...
FGCS
2010
126views more  FGCS 2010»
15 years 2 months ago
Perspectives on grid computing
Grid computing has been the subject of many large national and international IT projects in the past. However, it seems that the general expectations in Grids have not come true. ...
Uwe Schwiegelshohn, Rosa M. Badia, Marian Bubak, M...
HPDC
2012
IEEE
13 years 6 months ago
Understanding the effects and implications of compute node related failures in hadoop
Hadoop has become a critical component in today’s cloud environment. Ensuring good performance for Hadoop is paramount for the wide-range of applications built on top of it. In ...
Florin Dinu, T. S. Eugene Ng