[go: up one dir, main page]

Hashizume, 2011 - Google Patents

A Reference Architecture for Cloud Computing and Its Security

Hashizume, 2011

Document ID
17682800840874485263
Author
Hashizume K
Publication year
Publication venue
Computing

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/1002Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers, e.g. load balancing
    • H04L67/1031Controlling of the operation of servers by a load balancer, e.g. adding or removing servers that serve requests
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/5055Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering software capabilities, i.e. software resources associated or available to the machine
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks

Similar Documents

Publication Publication Date Title
Hashizume et al. An analysis of security issues for cloud computing
Gholami et al. Security and privacy of sensitive data in cloud computing: a survey of recent developments
Almorsy et al. An analysis of the cloud computing security problem
Yu et al. Cloud computing and security challenges
Subashini et al. A survey on security issues in service delivery models of cloud computing
Iqbal et al. Service delivery models of cloud computing: security issues and open challenges
Yeluri et al. Building the Infrastructure for Cloud Security: A Solutions View
Bouayad et al. Cloud computing: Security challenges
US12204642B2 (en) Hardware-based protection of application programming interface (API) keys
Will et al. Intel software guard extensions applications: A survey
Soares et al. Cloud security: state of the art
Mishra et al. Cloud security: attacks, techniques, tools, and challenges
Boneder Evaluation and comparison of the security offerings of the big three cloud service providers Amazon Web Services, Microsoft Azure and Google Cloud Platform
Pramod et al. Limitations and challenges in cloud-based applications development
Gholami Security and privacy of sensitive data in cloud computing
Bouchaala et al. End to end cloud computing architecture based on a novel classification of security issues
Sood Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
Anupa et al. Cloud workflow and security: A survey
Hashizume A reference architecture for cloud computing and its security applications
Banks et al. Trusted geolocation in the cloud: Proof of concept implementation (Draft)
Udayakumar Design and deploy security for infrastructure, data, and applications
Hashizume A Reference Architecture for Cloud Computing and Its Security
Liu et al. T-YUN: Trustworthiness verification and audit on the cloud providers
Reza Memarian et al. Applications of trusted computing in cloud context
Yeluri et al. Boundary control in the cloud: geo-tagging and asset tagging