Tải bản đầy đủ (.pdf) (4 trang)

Báo cáo " Nghiên cứu nguyên lý, kiến trúc điện toán đám mây và xây dựng phần mềm quản lý nguồn lực trên nền tảng Microsoft Azure " pptx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (163.8 KB, 4 trang )







i hc Công ngh
 ngành: ; 60 48 10
PGS.TS. 
 2011

Abstract: 









Keywords:   ;    ; Microsoft azure; 


Content
Cì nó
. 
 .  , 





















 ,  

  





















 - 















































, 

, 




 




. 





 , 



, 

















 . 



, 


, 











.







































 





 , 







. 








.

              




2


 

 
 
 

vào.




các tài nguyên tính toán.






nay có 





         



        


 
Nam.






3




 


-các


mây.



References
[1] Announcing the Advanced Encryption Standard (AES)
[2] CFengine (2009)

[3] Buco MJ et al (2004, Jan) Utility computing SLA management based upon business
objectives. IBM Syst J 43(1):159178
[4] David Chappel (2009), Introducing Windows Azure
[5] David S Linthcum , Praise for Cloud Computing and SOA Convergence in Your
Enterprise
[6] David Chappel (2009), Introducing Windows Azure
[7] David S Linthcum , Praise for Cloud Computing and SOA Convergence in Your
Enterprise
[8] Dominic Betts, Scott Densmore, Ryan Dunn, Masashi Narumoto, Eugenio Pace , Moving
Application to Cloud on the Microsoft Windows Azure
[9] GoGrid’s prepaid cloud hosting plans (2009).
[10] Henry Li (2009), Introduction to Windows Azure
[11] Hongwei Li, Yuanshun Dai , Bo Yang , Identity-Based Cryptography for Cloud Security
[12]
/>m/
[13]
[14]
[15] Liang Yan, Chunming Rong, and Gansen Zhao , Strengthen Cloud Computing Security
with Federal Identity Management Using Hierarchical Identity-Based Cryptography
[16] Nick Antonopoulos (2010), Computer Communications and Networks
[17] P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. Ben Othmane, L. Lilien, and M.
Linderman, “A User-Centric Approach for Privacy and Identity Management in Cloud
Computing,” Proc. 29th IEEE Intl. Symp. on Reliable Distributed Systems (SRDS), New
Delhi , India, Nov. 2010.
[18] OASIS (Organization for the Advancement of Structured Information Standards) (2009)

[19] Ristenpart T et al (2009) Hey, you, get off of my cloud: exploring information
leakage in third-party compute clouds. Proceeding of ACM conference on computer and
communications security


4
[20] Robert Elsenpeter Ph.D, Velte Toby J. Velte(2010) Cloud Computing: A Practical
Approach
[21] Robin Bloor, Marcia Kaufman, and Dr. Fern Halper (2010), Cloud Computing for
dummies Judith Hurwitz
[22] rPath (2009)
[23] Sheehan M (2009) Message from GoGrid founders regarding denial of service
attack. Retrieved from, GoGrid Official Blog,
[24] Tejaswi Redkar (2009), Windows Azure Platform
[25] Sriram Krishnan (May 2010), Programming Windows Azure

×